Enable MACsec

This page describes how to enable MACsec for Cloud Interconnect.

After you generate pre-shared keys and configure your on-premises router to use them, you need to enable MACsec for Cloud Interconnect. After MACsec for Cloud Interconnect is enabled, you verify that your Cloud Interconnect configuration is correctly configured and is using MACsec to help protect your data.

Before you begin

If you haven't completed set up, then set up MACsec before enabling MACsec for Cloud Interconnect.

Enable MACsec for Cloud Interconnect

Select one of the following options:

Console

  1. In the Google Cloud console, go to the Cloud Interconnect Physical connectionstab.

    Go to Physical connections

  2. Select the connection that you want to modify.

  3. On the MACsectab, click Enable.

    A confirmation window is displayed. Read the message, and then click Confirmto confirm that you want to enable MACsec, or Cancelto cancel.

gcloud

To enable MACsec for Cloud Interconnect with default settings, run the following command:

 gcloud compute interconnects macsec update INTERCONNECT_CONNECTION_NAME 
\
    --enabled 

Replace INTERCONNECT_CONNECTION_NAME with the name of your Cloud Interconnect connection.

Verify MACsec configuration

Select one of the following options:

Console

  1. In the Google Cloud console, go to the Cloud Interconnect Physical connectionstab.

    Go to Physical connections

  2. Select the connection that you want to view.

  3. The Link circuit infosection displays the following information:

    • Google circuit ID:the name of the link circuit.

    • Link state:the LACP member link's physical state displays a Checkand Activeto indicate that the LACP member link is up.

    • MACsec key name: displays a Checkand the name of the MACsec key name to indicate that MACsec is active on the link.

    • Receiving optical power:a Checkindicates an acceptable connection. The optical light level that the physical interface detects from the remote transmitter is displayed in dBm .

    • Transmitting optical power:a Checkindicates an acceptable connection and the optical light level that the physical interface is transmitting to the remote receiver is displayed in dBm.

    • Google demarc ID:the Google-assigned unique ID for the link circuit.

  4. Click the MACsectab. The MACsec configurationdisplays one of the following for your MACsec configuration:

    • Enabled, fail open:MACsec encryption is enabled on the link. If MACsec encryption isn't established between both ends, then the link operates without encryption.

    • Enabled, fail closed:MACsec encryption is enabled on the link. If MACsec encryption isn't established between both ends, then the link fails.

gcloud

Run the following command:

 gcloud compute interconnects describe INTERCONNECT_CONNECTION_NAME 
 

The output is similar to the following 10 GB Cloud Interconnect example; look for availableFeatures set to IF_MACSEC and the macsec section:

  adminEnabled 
 : 
  
 true 
 availableFeatures 
 : 
 - 
  
 IF_MACSEC 
 circuitInfos 
 : 
 - 
  
 customerDemarcId 
 : 
  
 fake-peer-demarc-0 
  
 googleCircuitId 
 : 
  
 LOOP-0 
  
 googleDemarcId 
 : 
  
 fake-local-demarc-0 
 creationTimestamp 
 : 
  
 '2021-10-05T03:39:33.888-07:00' 
 customerName 
 : 
  
 Fake Company 
 description 
 : 
  
 something important 
 googleReferenceId 
 : 
  
 '123456789' 
 id 
 : 
  
 '12345678987654321' 
 interconnectAttachments 
 : 
 - 
  
 https://www.googleapis.com/compute/v1/projects/my-project1/regions/us-central1/interconnectAttachments/interconnect-123456-987654321-0 
 interconnectType 
 : 
  
 IT_PRIVATE 
 kind 
 : 
  
 compute#interconnect 
 labelFingerprint 
 : 
  
 12H17262736_ 
 linkType 
 : 
  
 LINK_TYPE_ETHERNET_10G_LR 
 location 
 : 
  
 https://www.googleapis.com/compute/v1/projects/my-project1/global/interconnectLocations/cbf-zone2-65012 
 macsec 
 : 
  
 failOpen 
 : 
  
 false 
  
 preSharedKeys 
 : 
  
 - 
  
 name 
 : 
  
 key1 
  
 startTime 
 : 
  
 2023-07-01T21:00:01.000Z 
 macsecEnabled 
 : 
  
 true 
 name 
 : 
  
  INTERCONNECT_CONNECTION_NAME 
 
 operationalStatus 
 : 
  
 OS_ACTIVE 
 provisionedLinkCount 
 : 
  
 1 
 requestedFeatures 
 : 
 - 
  
 IF_MACSEC 
 requestedLinkCount 
 : 
  
 1 
 selfLink 
 : 
  
 https://www.googleapis.com/compute/v1/projects/my-project1/global/interconnects/ INTERCONNECT_CONNECTION_NAME 
 
 selfLinkWithId 
 : 
  
 https://www.googleapis.com/compute/v1/projects/my-project1/global/interconnects/12345678987654321 
 state 
 : 
  
 ACTIVE 
 

The following items specify the Cloud Interconnect connection's MACsec configuration:

  • availableFeatures :MACsec capability on the Cloud Interconnect connection. This parameter is shown only for 10 GB Cloud Interconnect connections, because all 100 GB Cloud Interconnect connections are MACsec capable by default.

  • macsec.failOpen :the connection's behavior if Cloud Interconnect can't establish an MKA session with your router. The value is either of the following:

    • false :if an MKA session can't be established, then Cloud Interconnect drops all traffic.

    • true :if an MKA session can't be established, then Cloud Interconnect passes unencrypted traffic.

  • macsec.preSharedKeys.name :the list of all pre-shared keys configured for Cloud Interconnect on this link.

  • macsec.preSharedKeys.startTime :the start time that the current pre-shared key is considered valid. All keys have infinite validity.

  • macsecEnabled :MACsec status for Cloud Interconnect on this link. The value is either of the following:

    • false :MACsec for Cloud Interconnect is off.
    • true :MACsec for Cloud Interconnect is on.

This command doesn't display MACsec operational status.

Enable MACsec on your on-premises router

Refer to your router vendor's documentation to enable MACsec on your on-premises router.

Undrain your Cloud Interconnect connection

If you previously drained your Cloud Interconnect connection, enable VLAN attachments .

What's next?

Create a Mobile Website
View Site in Mobile | Classic
Share by: