A macsec key update method and device
A technology for key update and network equipment, applied in the field of communication networks, can solve problems such as data transmission security threats and inability to ensure network security, and achieve the effect of improving timeliness and ensuring network security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0069] Embodiment 1. When the network device under attack is network device A, the MACsec key update process. In this embodiment, it is assumed that when under attack, the SA of each network device is SA0, the corresponding SAK is SAK1, and the corresponding AN is ANO.
[0070] In this embodiment, the network device under attack is KEY SERVER (that is, device A), and the MACsec key update process includes the following steps:
[0071] KEY SERVER (device A) generates SAK1 and corresponding AN1 and notifies non-KEY SERVERs (device B and device C) in the CA of SAK1 and corresponding AN1.
[0072] Usually, in order to ensure normal data transmission, the SC can contain multiple SAs, up to 4 SAs, and the ANs are AN0, AN1, AN2 and AN3 respectively. When the network device is working normally, usually only one SA is valid. When a network attack occurs or the link of the current transmission channel fails, the current SA can be switched to other SAs. In the embodiment of the present ...
Embodiment 2
[0098] Embodiment 2: When the network device under attack is not a KEY SERVER, the MACsec key update process.
[0099] The difference between Embodiment 2 and Embodiment 1 is that, after the network device under network attack determines that the device is not the KEYSERVER, it needs to notify the KEY SERVER so that the KEY SERVER can issue a new key.
[0100] Specifically, if the network device under network attack judges that the device is a non-KEY SERVER, it will notify the KEY SERVER through the existing protocol message. Set the Lowest Acceptable PN (minimum acceptable PN value) in the Keep alive message directly to 0xC0000000 and send it to the KEY SERVER. The KEY SERVER receives the Keep alive message and parses out the PN carried in it. If it is judged that the PN value is 0xC0000000 , it is known that the non-KEY SERVER has been attacked by the network, thereby triggering the operation of generating and issuing a new key.
[0101] It should be noted that the non-KEY...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


