This Video content information about MACSec. What is MACSec? Why MACSec as a solution? How MACSec works? Configuration of MACSec Configuration example is for router.
Пікірлер: 22
@jbadesara3 жыл бұрын
thanks for sharing the information with us it was very informative
@microscope33333 жыл бұрын
I needed a Quick go thru of the protocol, In 15 minutes you have explained the basics in the very structural way... It was almost like how i would align it in my brain. Thank You for Sharing this high Quality content.
@balramshekhawat94533 жыл бұрын
Glad it helped!
@nkudremukhn3 жыл бұрын
Jao Siya ram 🙏 thank you for the video
@D0ct0rM0nk3y6 ай бұрын
Inconsistent naming of the key used to generate the ICV. Is it ICV key or ICK?
@shaileshkumar-ss7po3 жыл бұрын
I thank you for being such an amazing topic explained here 🙏
@torresattaluri2 жыл бұрын
Balaram did we need lisence to run MacSec and on which platfrom cisco devices will support this feature.. Thanks
@aroonharyani12 жыл бұрын
Hi Balram, Thnak you for the great and simplistic video on MACSEC. Can you please advise, how can we capture traffic between two MACsec enable switches (I am using Nexus 9310YC)?
@msheikfaaruk56 Жыл бұрын
can i achieve Macsec in cisco packet tracer or GNS3 for simulation
@ummm_ok2 жыл бұрын
Thanks I found that very useful
@kreddy-xe5ne Жыл бұрын
Can u share the notes of this
@ClipHero11 Жыл бұрын
Great video, thank you
@SudhirKumar-wo6ew3 жыл бұрын
Hello Balram, If i don't configure key-server-priority, will there still be a "key server" between macsec pairs ?
@balramshekhawat94533 жыл бұрын
Yes... When we don't configure means both willl have default value which means same priority so election will be based on SCI.
@SudhirKumar-wo6ew3 жыл бұрын
@@balramshekhawat9453 Is SCI configurable ? or this will happen automatically by the system?
@matttheswede Жыл бұрын
Great work. thank you!
@drooged7 ай бұрын
Great work!
@msconfig97862 жыл бұрын
UR Awesome!!!
@mdfarhadhussain2 жыл бұрын
Really helpful!!
@abcd70542 жыл бұрын
Well explained. It's very important that mapping is done from theory to practical configuration, which is well done here. Thanks👌