Skip to content

Commit ecbd179

Browse files
Merge pull request #313373 from duongau/expressroute-css-update-562622
Update MACsec SCI step from optional to required for on-premises Cisco devices
2 parents c9cc211 + 9648820 commit ecbd179

1 file changed

Lines changed: 4 additions & 1 deletion

File tree

articles/expressroute/expressroute-howto-macsec.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ Every ExpressRoute Direct instance consists of two physical ports. You can activ
149149
150150
MACsec is now enabled on the ExpressRoute Direct ports on Microsoft side. If you didn't configure it on your edge devices, you can proceed to configure them with the same MACsec secrets and cipher.
151151
152-
1. (Optional) To activate the ports that are in Administrative Down state, run the following commands:
152+
1. (Required for on-premises Cisco devices) Enable Secure Channel Identifier (SCI) on the ExpressRoute Direct ports. This setting is required when your on-premises device is a Cisco router connecting to the Azure Juniper MSEE. Without SCI enabled, traffic fails between both sides.
153153
154154
```azurepowershell-interactive
155155
$erDirect = Get-AzExpressRoutePort -ResourceGroupName "your_resource_group" -Name "your_direct_port_name"
@@ -159,6 +159,9 @@ Every ExpressRoute Direct instance consists of two physical ports. You can activ
159159
```
160160
161161
SCI is now enabled on the ExpressRoute Direct ports.
162+
163+
> [!IMPORTANT]
164+
> MACsec on ExpressRoute Direct is only supported on Juniper MSEE devices. If your ExpressRoute Direct resource is on a Cisco MSEE, you need to recreate the ExpressRoute Direct resource to land on a Juniper device. To verify your MSEE device type, check the ExpressRoute Direct resource in the Azure portal.
162165
163166
### How to disable MACsec
164167

0 commit comments

Comments
 (0)