Demo to show MACsec using SFP in RAD-GigaStar or RAD-Moon2/3 series
 
 
 
Go to file
Andreas Kirsch 1b9f39910b Initial commit - moved from https://git.intrepidcs.de/Andreas/Demos 2025-02-13 10:43:40 +01:00
MACsec_Utilitie Initial commit - moved from https://git.intrepidcs.de/Andreas/Demos 2025-02-13 10:43:40 +01:00
SFP_Flasher/v1.4 Initial commit - moved from https://git.intrepidcs.de/Andreas/Demos 2025-02-13 10:43:40 +01:00
resources Initial commit - moved from https://git.intrepidcs.de/Andreas/Demos 2025-02-13 10:43:40 +01:00
ReadMe.md Initial commit - moved from https://git.intrepidcs.de/Andreas/Demos 2025-02-13 10:43:40 +01:00
TC10_MACsec Demo.vs3 Initial commit - moved from https://git.intrepidcs.de/Andreas/Demos 2025-02-13 10:43:40 +01:00

ReadMe.md

MACsec and TC10 demo

Show case

The demo should show:

  1. MACsec secured datastream - only one Module is MACsec configured, modules might be swapped for showcasing
  2. TC10 controlled SFP plugs

Needed equipment:

  • GigaStar
  • 2 SFP: MV2221M 1000-Base-T1 modules, enabled for TC10/MACsec

1. Preparation

  • If SFP module MV2221M 1000-Base-T1 is not yet flashed to support MACsec,
    RGS_ICS_SFP_FLASHER_REV1_4.vs3 is needed to flash the module. Take care that also the binary sfp_mv2221m_b1_mchip.msgbin is available.
  • To download a MACsec configuration, actually you will need a small python script you find in the MACsec_Utilities folder (see 2.)
    In this case you might have to install python onto the PC
    Also you will need python_ics pip instal python_ics and pip install pyyaml

2. Downloading MACsec configuration to SFP module

If the SFP module is ready for MACsec en- and decryption, you can download one of the Example YAML-Files
e.g.
programming SFP01 of device GS0728: python test_sfp_macsec_util.py GS0728 --sfp --config_netid NETID_I2C2 --yaml test_sfp_macsec_Rule_wildcard_SecY_256_strip_noEncrypt_onlyCheck_sci_SA_sak0.yml
programming SFP02 of device GS0728: python test_sfp_macsec_util.py GS0728 --sfp --config_netid NETID_I2C3 --yaml test_sfp_macsec_Rule_wildcard_SecY_256_strip_noEncrypt_onlyCheck_sci_SA_sak0.yml
clearing SFP02 of device GS0728: python test_sfp_macsec_util.py GS0728 --sfp --config_netid NETID_I2C3 --yaml test_sfp_macsec_Rule_wildcard_SecY_256_strip_noEncrypt_onlyCheck_sci_SA_sak0.yml --reset
or just
python test_sfp_macsec_util.py GS0728 --sfp --config_netid NETID_I2C3 --reset

There are four example batch-files available to set and reset SFP01 and SFP02 modules. Device SN has to be adjusted.

3. Demosetup TC10_MACsec Demo.vs3

Description
Graphical panel If SFP modules are swapped direction of encryption will change