Application Scenarios for MACsec
In Figure 12-2, point-to-point MACsec is configured between SwitchA and SwitchB to protect exchanged data.
In Figure 12-3, SwitchC, SwitchD, and SwitchE are deployed between SwitchA and SwitchB, and point-to-point MACsec is configured between SwitchA and SwitchB to protect exchanged data. To ensure that SwitchA and SwitchB can perform MACsec session negotiation, enable Layer 2 protocol transparent transmission on SwitchC and SwitchD.