Skip to content

Commit 81b99df

Browse files
authored
Merge pull request #126464 from MicrosoftAzureAaron/patch-4
Update expressroute-howto-macsec.md
2 parents a2e8bec + ded562c commit 81b99df

File tree

1 file changed

+6
-2
lines changed

1 file changed

+6
-2
lines changed

articles/expressroute/expressroute-howto-macsec.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -113,13 +113,17 @@ Every ExpressRoute Direct instance consists of two physical ports. You can activ
113113
114114
115115
> [!NOTE]
116-
> You can configure both XPN and Non-XPN ciphers:
116+
> You can configure Non-XPN ciphers for 10 gbps ExpressRoute Ports:
117117
> * GcmAes128
118118
> * GcmAes256
119+
>
120+
> You can configure either Non-XPN or XPN ciphers for 40 gbps and greater ExpressRoute Ports:
121+
> * GcmAes128
122+
> * GcmAes256
119123
> * GcmAesXpn128
120124
> * GcmAesXpn256
121125
>
122-
> The suggested best practice is to set up encryption with xpn ciphers to prevent sporadic session failures that occur with non-xpn ciphers on high speed links.
126+
> The suggested best practice is to set up encryption with xpn ciphers to prevent sporadic session failures that occur with non-xpn ciphers on links with 40 gbps or greater bandwidth.
123127
124128
1. Establish the MACsec secrets and cipher and link the user identity with the port to enable the ExpressRoute management code to retrieve the MACsec secrets when required.
125129

0 commit comments

Comments
 (0)