Contents
Configuring MACsec ······················································································· 2
Overview ···························································································································································· 2
Basic concepts ··········································································································································· 2
MACsec services ······································································································································· 2
MACsec applications ·································································································································· 3
MACsec operating mechanism ·················································································································· 3
Protocols and standards ···························································································································· 5
MACsec configuration task list ··························································································································· 5
Enabling MKA ···················································································································································· 6
Enabling MACsec desire ···································································································································· 6
Configuring a preshared key ······························································································································ 7
Configuring an MKA policy ························································································································· 9
Applying an MKA policy ··························································································································· 10
MACsec configuration examples ····················································································································· 11
Troubleshooting MACsec ································································································································· 17
Conventions ····················································································································································· 18
Network topology icons ···································································································································· 19
Accessing updates ··········································································································································· 20
Websites ·················································································································································· 21
Customer self repair ································································································································· 21
Remote support ········································································································································ 21
Documentation feedback ························································································································· 21
Index ············································································································· 23
i
Need help?
Do you have a question about the FlexNetwork 5510 HI Series and is the answer not in the manual?