Overview
Provides guidance on deploying and configuring MACsec encryption across WAN environments, covering physical and Layer 3 subinterface applications, VLAN-based policies, and EAPoL configuration for secure, interoperable network topologies.
This chapter provides comprehensive guidance on deploying and configuring MACsec encryption for secure Ethernet encryption across WAN environments. Users can learn how to apply MACsec on physical interfaces and Layer 3 subinterfaces, set VLAN-based policies, and customize EAPoL Ether-types and destination addresses to enhance security and interoperability in diverse network topologies.
WAN MACsec encryption
Defines WAN MACsec encryption as an IEEE 802.1AE-based solution that provides end-to-end security across Layer 2 Ethernet WAN services, supporting both point-to-point and point-to-multipoint topologies.
Applications of MACsec in WAN environments
Explains the application of MACsec in VPLS/EVPN and MPLS core networks, detailing how to implement encryption on physical interfaces and link bundles to secure data between geographically distributed data centers.
MACsec encryption on Layer 3 subinterfaces
Describes how MACsec encryption on Layer 3 subinterfaces allows for independent encryption control and policy application per VLAN, while retaining unencrypted VLAN tags for proper traffic switching.
Alternate EAPoL Ether-type and Destination address
Explains the use of alternate EAPoL Ether-types and destination addresses to prevent intermediate Layer 2 devices from consuming EAPoL packets, improving reliability in service provider WAN deployments.