Overview
Provides guidance on configuring point-to-point MACsec encryption using the Secure Key Integration Protocol (SKIP) and Quantum Key Distribution (QKD) devices to achieve quantum-safe key management on routers.
This chapter provides guidance on configuring point-to-point MACsec encryption using the Secure Key Integration Protocol (SKIP) with Quantum Key Distribution (QKD) devices. It covers protocol overview, configuration steps, supported topologies, and key operational considerations for achieving quantum-safe key management on the routers.
Secure Key Integration Protocol
Explains how the Secure Key Integration Protocol enables routers to communicate with external Quantum Key Distribution devices, facilitating quantum-safe key management for MACsec encryption.
How point-to-point MACsec encryption using SKIP works
Describes the workflow for establishing secure point-to-point MACsec links by leveraging external QKD networks for automated, quantum-safe key exchange between peer routers.
Restrictions for MACsec encryption using SKIP
Outlines specific hardware and configuration restrictions for implementing MACsec encryption using the SKIP protocol, including device compatibility and deployment model requirements.
Configure point-to-point MACsec encryption using SKIP
Establish quantum-safe, point-to-point MACsec encryption by configuring SKS profiles with external QKD servers and mapping them to MACsec policies. This process enables automated, secure key provisioning across your physical interfaces to ensure robust, quantum-resistant data protection.