<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: L2 Trunk encryption in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/l2-trunk-encryption/m-p/5269241#M1119954</link>
    <description>&lt;P&gt;If MACSec is not an option, would it be a possibility to setup a firewall at the remote end using a temporary subnet / link-net over the L2 line provided by the ISP, and then setup a site to site between the two.&lt;/P&gt;</description>
    <pubDate>Sun, 09 Mar 2025 19:07:22 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2025-03-09T19:07:22Z</dc:date>
    <item>
      <title>L2 Trunk encryption</title>
      <link>https://community.cisco.com/t5/network-security/l2-trunk-encryption/m-p/5269058#M1119938</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;we are going to move our offices between buildings. Our ISP is able to provide us L2 1gbps QinQ line between buildings for 2 months so we can start moving services and servers partially. The thing is that L2 is not encrypted anyhow from them. We want to use it as trunk, and its a must because we will have to split some VLANs during movement as we are not able to move all services in those vlans at once. And we need to ensure all traffic is encrypted.&lt;/P&gt;
&lt;P&gt;I plan to have on each side of L2 Nexus&amp;nbsp;N9K-C93180YC-EX or&amp;nbsp;N9K-C9372PX-E, eventually I still have ASA5516-X and ASA5508-X (where I was thinking about transparent mode, but never worked with it and do not know if it supports trunk and S2S on transparent mode).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What we can use to achieve this L2 trunk encryption please? anybody with such experience?&lt;/P&gt;</description>
      <pubDate>Sun, 09 Mar 2025 01:55:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2-trunk-encryption/m-p/5269058#M1119938</guid>
      <dc:creator>Tibor M</dc:creator>
      <dc:date>2025-03-09T01:55:05Z</dc:date>
    </item>
    <item>
      <title>Re: L2 Trunk encryption</title>
      <link>https://community.cisco.com/t5/network-security/l2-trunk-encryption/m-p/5269060#M1119939</link>
      <description>&lt;P&gt;You might take a look at&lt;A href="https://en.wikipedia.org/wiki/IEEE_802.1AE" target="_self"&gt; IEEE 802.1AE&lt;/A&gt; (aka, &lt;A href="https://community.cisco.com/t5/networking-knowledge-base/macsec-history-amp-terminology/ta-p/4436094" target="_self"&gt;MACSEC&lt;/A&gt;), to see if the concept meets your needs, as it was designed specifically for L2 encryption. If so, then you could dig into the Nexus 9K support and caveats.&lt;/P&gt;</description>
      <pubDate>Sun, 09 Mar 2025 02:16:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2-trunk-encryption/m-p/5269060#M1119939</guid>
      <dc:creator>Ramblin Tech</dc:creator>
      <dc:date>2025-03-09T02:16:24Z</dc:date>
    </item>
    <item>
      <title>Re: L2 Trunk encryption</title>
      <link>https://community.cisco.com/t5/network-security/l2-trunk-encryption/m-p/5269081#M1119941</link>
      <description>&lt;P&gt;One option is MACSEC - make sure nexus have right License :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/dcn/nx-os/nexus9000/103x/configuration/security/cisco-nexus-9000-nx-os-security-configuration-guide-103x/m-configuring-macsec.html#id_72606" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/dcn/nx-os/nexus9000/103x/configuration/security/cisco-nexus-9000-nx-os-security-configuration-guide-103x/m-configuring-macsec.html#id_72606&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Other option you can have VXLAN (over engineering)&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/dcn/nx-os/nexus9000/104x/configuration/vxlan/cisco-nexus-9000-series-nx-os-vxlan-configuration-guide-release-104x/m-configuring-cloudsec.html#:~:text=Secure%20VXLAN%20EVPN%20Multi%2DSite%20using%20CloudSec%20ensures%20data%20security,between%20authorized%20VXLAN%20EVPN%20endpoints" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/dcn/nx-os/nexus9000/104x/configuration/vxlan/cisco-nexus-9000-series-nx-os-vxlan-configuration-guide-release-104x/m-configuring-cloudsec.html#:~:text=Secure%20VXLAN%20EVPN%20Multi%2DSite%20using%20CloudSec%20ensures%20data%20security,between%20authorized%20VXLAN%20EVPN%20endpoints&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Sun, 09 Mar 2025 09:33:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2-trunk-encryption/m-p/5269081#M1119941</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2025-03-09T09:33:56Z</dc:date>
    </item>
    <item>
      <title>Re: L2 Trunk encryption</title>
      <link>https://community.cisco.com/t5/network-security/l2-trunk-encryption/m-p/5269110#M1119945</link>
      <description>&lt;P&gt;thanks both, it looks like MACSec is not an option &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; On both models I have only&amp;nbsp;LAN_ENTERPRISE_SERVICES_PKG license, no security addon. and I do not see even "feature macsec" command.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Mar 2025 11:52:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2-trunk-encryption/m-p/5269110#M1119945</guid>
      <dc:creator>Tibor M</dc:creator>
      <dc:date>2025-03-09T11:52:21Z</dc:date>
    </item>
    <item>
      <title>Re: L2 Trunk encryption</title>
      <link>https://community.cisco.com/t5/network-security/l2-trunk-encryption/m-p/5269119#M1119946</link>
      <description>&lt;P&gt;But what about Catalyst 9200L ? I have several&amp;nbsp;C9200L-24T-4X which look like support macsec too on network essential license.&lt;/P&gt;</description>
      <pubDate>Sun, 09 Mar 2025 12:34:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2-trunk-encryption/m-p/5269119#M1119946</guid>
      <dc:creator>Tibor M</dc:creator>
      <dc:date>2025-03-09T12:34:32Z</dc:date>
    </item>
    <item>
      <title>Re: L2 Trunk encryption</title>
      <link>https://community.cisco.com/t5/network-security/l2-trunk-encryption/m-p/5269182#M1119952</link>
      <description>&lt;P&gt;I was suggested based on the nexus model.&lt;/P&gt;
&lt;P&gt;The Cat 9K model also needs a license for MACSec (I have never tested Cat 9200 with MAC Sec), which are basic Access Layer switches. Cat 9300/9400/9500/9600 works as expected with the correct License.&lt;/P&gt;
&lt;P&gt;If they are terminating to a Firewall, you can tunnel the traffic if you like and use basic Layer 2 Switches to terminate the Links.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Mar 2025 15:00:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2-trunk-encryption/m-p/5269182#M1119952</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2025-03-09T15:00:08Z</dc:date>
    </item>
    <item>
      <title>Re: L2 Trunk encryption</title>
      <link>https://community.cisco.com/t5/network-security/l2-trunk-encryption/m-p/5269241#M1119954</link>
      <description>&lt;P&gt;If MACSec is not an option, would it be a possibility to setup a firewall at the remote end using a temporary subnet / link-net over the L2 line provided by the ISP, and then setup a site to site between the two.&lt;/P&gt;</description>
      <pubDate>Sun, 09 Mar 2025 19:07:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2-trunk-encryption/m-p/5269241#M1119954</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2025-03-09T19:07:22Z</dc:date>
    </item>
    <item>
      <title>Re: L2 Trunk encryption</title>
      <link>https://community.cisco.com/t5/network-security/l2-trunk-encryption/m-p/5269255#M1119957</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;&amp;nbsp;That is what I can't do. I need several VLANs IDs on both sides (one VLAN i.e. 345 on both sides, with i.e. 10.1.2.0/23 on both sides) because we will move some servers on one date and rest of another. and I'm unable to readdress those servers and put to different subnet.&lt;/P&gt;</description>
      <pubDate>Sun, 09 Mar 2025 20:12:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2-trunk-encryption/m-p/5269255#M1119957</guid>
      <dc:creator>Tibor M</dc:creator>
      <dc:date>2025-03-09T20:12:36Z</dc:date>
    </item>
    <item>
      <title>Re: L2 Trunk encryption</title>
      <link>https://community.cisco.com/t5/network-security/l2-trunk-encryption/m-p/5269274#M1119958</link>
      <description>&lt;P&gt;What about enabling trial license on the switches?&amp;nbsp; If I am not mistaken you will have 90 days trial license with access to full functionality.&amp;nbsp; Then enable MACSec, do your transfer, and then remove MACSec and revert the license to the original.&lt;/P&gt;
&lt;P&gt;If you have already used up your 90 trial, then I would suggest contacting Cisco or your Cisco partner and explain the situation and request that they provide a trial so that MACSec can be implemented for the migration.&lt;/P&gt;
&lt;P&gt;Other than that, and short of adding more hardware or permanent licensing, there is not much you can do.&lt;/P&gt;</description>
      <pubDate>Sun, 09 Mar 2025 21:18:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2-trunk-encryption/m-p/5269274#M1119958</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2025-03-09T21:18:00Z</dc:date>
    </item>
  </channel>
</rss>

