Skip to content

Commit 9648820

Browse files
committed
docs: Update MACsec SCI step from optional to required for on-premises Cisco devices
1 parent c9cc211 commit 9648820

1 file changed

Lines changed: 4 additions & 1 deletion

File tree

articles/expressroute/expressroute-howto-macsec.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ Every ExpressRoute Direct instance consists of two physical ports. You can activ
149149
150150
MACsec is now enabled on the ExpressRoute Direct ports on Microsoft side. If you didn't configure it on your edge devices, you can proceed to configure them with the same MACsec secrets and cipher.
151151
152-
1. (Optional) To activate the ports that are in Administrative Down state, run the following commands:
152+
1. (Required for on-premises Cisco devices) Enable Secure Channel Identifier (SCI) on the ExpressRoute Direct ports. This setting is required when your on-premises device is a Cisco router connecting to the Azure Juniper MSEE. Without SCI enabled, traffic fails between both sides.
153153
154154
```azurepowershell-interactive
155155
$erDirect = Get-AzExpressRoutePort -ResourceGroupName "your_resource_group" -Name "your_direct_port_name"
@@ -159,6 +159,9 @@ Every ExpressRoute Direct instance consists of two physical ports. You can activ
159159
```
160160
161161
SCI is now enabled on the ExpressRoute Direct ports.
162+
163+
> [!IMPORTANT]
164+
> MACsec on ExpressRoute Direct is only supported on Juniper MSEE devices. If your ExpressRoute Direct resource is on a Cisco MSEE, you need to recreate the ExpressRoute Direct resource to land on a Juniper device. To verify your MSEE device type, check the ExpressRoute Direct resource in the Azure portal.
162165
163166
### How to disable MACsec
164167

0 commit comments

Comments
 (0)