Wednesday, December 16, 2020

Basics of MACsec

Basics of MACsec

Media Access Control Security

Media Access Control security (MACsec) offers point-to-point security on Ethernet connection. It is defined by IEEE standard 802.1AE and works in layer-2 encryption technology. It can be used in combination with other security protocols, such as IP Security (IPsec) and Secure Sockets Layer (SSL), to provide end-to-end network security. 

It is used at ethernet networks, WAN routers, LAN switches, Data Centre routers and switches, Servers, router to switch, switch to switch, server to switch and end devices.  

For end-to-end security, data needs to be secured when at rest (stored in a device) and when in motion (communicated between connected devices). 

After configuring and enabling MACsec, when data is in motion or transit, security added in communication layer and one bi-directional secure communication link is established and is combined with data integrity check and encryption. 

MACsec can identify and preventing most security threats such as denial of service (DoS), intrusion, man-in-the-middle attack, etc.

MACsec have three security modes:
  • Static connectivity association key (S-CAK)
  • Static secure association key (S-SAK)
  • Dynamic secure association key (D-SAK)
Benefits of using MACsec:
  • Device to device security
  • Confidentiality
  • Data origin authenticity
  • Data integrity
  • Replay protection
  • Deployment flexibility
-DR

No comments:

Post a Comment

Network Scanning Tools

Network Scanning through Nmap and Nessus Network scanning is a process used to troubleshoot active devices on a network for vulnerabilities....