3 April 2018 at 07:31
> To: grbartle Graham <grbar...@cisco.com>
> Cc: Nick Cutting <ncutt...@edgetg.com>, "Alex K." <nsp.li...@gmail.com>,
> Alan Buxey <alan.bu...@gmail.com>, cisco-nsp <cisco-nsp@puck.nether.net>
> Subject: Re: [c-nsp] MACSec Stages
&
co-nsp@puck.nether.net
Subject: [c-nsp] MACSec Stages
Hello everyone,
After a few implementations of MACSec, I began wondering is there a
complete documentation of that technology out there?
For example, I have quite an experience with L2TP. Now, SCCRP may sound
like a bad language to some, but as
t;, cisco-nsp <cisco-nsp@puck.nether.net>
Subject: Re: [c-nsp] MACSec Stages
Hi Graham,
Kind of OT, but what is the title of your book on IPsec VPN?
thanks
On Fri, Apr 20, 2018 at 7:55 AM, Graham Bartlett (grbartle)
<grbar...@cisco.com> wrote:
Hi
A few of us in Cisco were thinking
tch!
> -Original Message-
> From: cisco-nsp <cisco-nsp-boun...@puck.nether.net> On Behalf Of Alex
> K.
> Sent: Tuesday, April 17, 2018 4:13 AM
> To: Alan Buxey <alan.bu...@gmail.com>
> Cc: cisco-nsp <cisco-nsp@puck.nether.net>
> S
I'll second that.
Proper documentation, *not* simply configuration guides, available on Cisco
website - is a MUST. Not something you can possibly avoid doing until
___ (fill in reason to your liking).
I hope it goes without saying.
On the other hand, *it is *worth mentioning, that my
On 20 April 2018 at 06:55, Graham Bartlett (grbartle)
wrote:
> Hi
>
> A few of us in Cisco were thinking of writing a CiscoPress book on MACsec,
> which would include details of the inner workings, including protocol flows
> and how the various key material is derived etc.
>
ticle by Jeremey Stretch!
-Original Message-
From: cisco-nsp <cisco-nsp-boun...@puck.nether.net> On Behalf Of Alex K.
Sent: Tuesday, April 17, 2018 4:13 AM
To: Alan Buxey <alan.bu...@gmail.com>
Cc: cisco-nsp <cisco-nsp@puck.nether.net>
Might this be what you're looking for?
https://communities.cisco.com/docs/DOC-69479
Ian Mock
On Tue, Apr 3, 2018 at 6:28 PM, Alex K. wrote:
> Hello everyone,
>
> After a few implementations of MACSec, I began wondering is there a
> complete documentation of that
.
Sent: Tuesday, April 17, 2018 4:13 AM
To: Alan Buxey <alan.bu...@gmail.com>
Cc: cisco-nsp <cisco-nsp@puck.nether.net>
Subject: Re: [c-nsp] MACSec Stages
This message originates from outside of your organisation.
Hello Alan and thank you for answering.
That's the point - all one can
Hello Alan and thank you for answering.
That's the point - all one can find by searching the standard ID, is a
bunch of unrelated documents, some from IEEE, some from independent sources
- none display any coherent picture whatsoever.
Not to mention none provide any overview of the protocol.
802.1AE
Look that up for how it works
alan
On Wed, 4 Apr 2018, 00:32 Alex K., wrote:
> Hello everyone,
>
> After a few implementations of MACSec, I began wondering is there a
> complete documentation of that technology out there?
>
> For example, I have quite an
Hello everyone,
After a few implementations of MACSec, I began wondering is there a
complete documentation of that technology out there?
For example, I have quite an experience with L2TP. Now, SCCRP may sound
like a bad language to some, but as we all know, it's an important step in
tunnel
12 matches
Mail list logo