MACSec (Media Access Control Security) Overview

  Рет қаралды 19,001

Balram Shekhawat

Balram Shekhawat

Күн бұрын

Пікірлер: 25
@microscope3333
@microscope3333 3 жыл бұрын
I needed a Quick go thru of the protocol, In 15 minutes you have explained the basics in the very structural way... It was almost like how i would align it in my brain. Thank You for Sharing this high Quality content.
@balramshekhawat9453
@balramshekhawat9453 3 жыл бұрын
Glad it helped!
@ashishsawant5965
@ashishsawant5965 2 ай бұрын
Thanks for this very informative and deep dive explanation in short span of time..
@jbadesara
@jbadesara 3 жыл бұрын
thanks for sharing the information with us it was very informative
@raghu7333
@raghu7333 Ай бұрын
Thanks much! Nice info binded in ppt
@shaileshkumar-ss7po
@shaileshkumar-ss7po 3 жыл бұрын
I thank you for being such an amazing topic explained here 🙏
@devr3860
@devr3860 8 күн бұрын
Hello Can you make a video on the MKA which is part of this macsec please , in detail
@abcd7054
@abcd7054 2 жыл бұрын
Well explained. It's very important that mapping is done from theory to practical configuration, which is well done here. Thanks👌
@balramshekhawat9453
@balramshekhawat9453 Жыл бұрын
Glad it was helpful!
@aroonharyani1
@aroonharyani1 2 жыл бұрын
Hi Balram, Thnak you for the great and simplistic video on MACSEC. Can you please advise, how can we capture traffic between two MACsec enable switches (I am using Nexus 9310YC)?
@drooged
@drooged 11 ай бұрын
Great work!
@matttheswede
@matttheswede Жыл бұрын
Great work. thank you!
@torresattaluri
@torresattaluri 2 жыл бұрын
Balaram did we need lisence to run MacSec and on which platfrom cisco devices will support this feature.. Thanks
@D0ct0rM0nk3y
@D0ct0rM0nk3y 10 ай бұрын
Inconsistent naming of the key used to generate the ICV. Is it ICV key or ICK?
@ClipHero11
@ClipHero11 2 жыл бұрын
Great video, thank you
@ummm_ok
@ummm_ok 2 жыл бұрын
Thanks I found that very useful
@msheikfaaruk56
@msheikfaaruk56 2 жыл бұрын
can i achieve Macsec in cisco packet tracer or GNS3 for simulation
@mdfarhadhussain
@mdfarhadhussain 2 жыл бұрын
Really helpful!!
@SudhirKumar-wo6ew
@SudhirKumar-wo6ew 3 жыл бұрын
Hello Balram, If i don't configure key-server-priority, will there still be a "key server" between macsec pairs ?
@balramshekhawat9453
@balramshekhawat9453 3 жыл бұрын
Yes... When we don't configure means both willl have default value which means same priority so election will be based on SCI.
@SudhirKumar-wo6ew
@SudhirKumar-wo6ew 3 жыл бұрын
@@balramshekhawat9453 Is SCI configurable ? or this will happen automatically by the system?
@nkudremukhn
@nkudremukhn 3 жыл бұрын
Jao Siya ram 🙏 thank you for the video
@msconfig9786
@msconfig9786 2 жыл бұрын
UR Awesome!!!
@kreddy-xe5ne
@kreddy-xe5ne Жыл бұрын
Can u share the notes of this
MACSec Mikrotik - Hop by Hop Encryption
23:44
Wilmer Almazan / The Network Trip
Рет қаралды 1,7 М.
Getting Started with NETCONF
17:36
Kevin Wallace Training, LLC
Рет қаралды 58 М.
小丑女COCO的审判。#天使 #小丑 #超人不会飞
00:53
超人不会飞
Рет қаралды 16 МЛН
Understand how the Dot1X (802.1x) protocol works
18:05
MAICT
Рет қаралды 18 М.
MACSec
4:57
Phil Anderson
Рет қаралды 6 М.
WAN MAcsec on Catalyst 9000 Switches
17:23
Cisco Catalyst TV
Рет қаралды 262
Zero-trust network encryption with IEEE 802.1AE MACsec layer-2 security
11:56
Axis Communications
Рет қаралды 1,5 М.
Trustsec: Overview of Trustsec and Terminology
12:03
Katherine McNamara
Рет қаралды 19 М.
SSL, TLS, HTTPS Explained
5:54
ByteByteGo
Рет қаралды 858 М.
How a PTP slave syncs with a PTP master
14:46
David Gessner
Рет қаралды 63 М.
1. VXLAN EVPN Overview
9:05
Balram Shekhawat
Рет қаралды 4,3 М.
Each layer of the OSI model and TCP/IP explained.
19:48
danscourses
Рет қаралды 297 М.