You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: doc/SAI-Proposal-MACSec-Secure-Policy.md
+11-2Lines changed: 11 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,6 +35,8 @@ Must Secure is the most stringent secure policy.
35
35
36
36
- If MKA session remains down, only EAPol(Extensible Authentication Protocol over LAN) packets are exchanged.
37
37
38
+
- If the peer does not support MACsec, traffic still passes unencrypted (avoiding connectivity loss).
39
+
38
40
## Should Secure (Fail-Open)
39
41
40
42
Should Secure is a less stricter policy than Must Secure.
@@ -45,9 +47,11 @@ Should Secure is a less stricter policy than Must Secure.
45
47
46
48
- The network continues to function, but the traffic on that specific link remains unencrypted.
47
49
50
+
- If the peer does not support MACsec, traffic still passes unencrypted (avoiding connectivity loss).
51
+
48
52
# SAI Attribute Enhancement
49
53
50
-
The MACSec port attribute is newly introduced to allow configuration of the MACSec secure policy.
54
+
The below MACSec port attribute is newly introduced to allow configuration of the MACSec secure policy. This attribute controls how the switch’s MACsec security engine enforces link protection. When set, the attribute instructs the hardware to apply the corresponding policy on the specified port.
0 commit comments