Overview
Outlines specific hardware and configuration restrictions for implementing MACsec encryption using the SKIP protocol, including device compatibility and deployment model requirements.
Before implementing MACsec encryption using the SKIP protocol, you must consider the following restrictions:
-
Use the SKIP protocol only on 8202-32FH-M routers.
-
Configure SKIP only for point-to-point MACsec encryption.
-
Enable SKIP protocol only on interfaces that support MACsec encryption.