You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If you already have a key vault or a resource group, you can reuse them. However, it is critical that you enable the [**soft-delete** feature](../key-vault/general/soft-delete-overview.md) on your existing key vault. If soft-delete is not enabled, you can use the following commands to enable it:
47
+
If you already have a Key Vault or a resource group, you can reuse them. However, it's critical that you enable the [**soft-delete** feature](../key-vault/general/soft-delete-overview.md) on your existing Key Vault. If soft-delete isn't enabled, run the following commands to enable it:
If New-AzUserAssignedIdentity is not recognized as a valid PowerShell cmdlet, install the following module (in Administrator mode) and rerun the above command.
64
+
If New-AzUserAssignedIdentity isn't recognized as a valid PowerShell cmdlet, install the following module (in Administrator mode) and rerun the above command.
66
65
67
66
```azurepowershell-interactive
68
67
Install-Module -Name Az.ManagedServiceIdentity
69
68
```
70
-
3. Create a connectivity association key (CAK) and a connectivity association key name (CKN) and store them in the key vault.
69
+
1. Create a connectivity association key (CAK) and a connectivity association key name (CKN) and store them in the Key Vault.
## 2. Configure MACsec on ExpressRoute Direct ports
99
+
## Configure MACsec on ExpressRoute Direct ports
102
100
103
101
### To enable MACsec
104
102
105
-
Each ExpressRoute Direct instance has two physical ports. You can choose to enable MACsec on both ports at the same time or enable MACsec on one port at a time. Doing it one port at time (by switching traffic to an active port while servicing the other port) can help minimize the interruption if your ExpressRoute Direct is already in service.
103
+
Each ExpressRoute Direct instance has two physical ports. You can choose to enable MACsec on both ports at the same time or enable MACsec one port at a time. Doing it one port at time by switching traffic to an active port while servicing the other port can help minimize the interruption if your ExpressRoute Direct is already in service.
106
104
107
105
> [!NOTE]
108
106
> You can configure both XPN and Non-XPN ciphers:
@@ -111,7 +109,6 @@ Each ExpressRoute Direct instance has two physical ports. You can choose to enab
111
109
> * GcmAesXpn128
112
110
> * GcmAesXpn256
113
111
>
114
-
>
115
112
116
113
1. Set MACsec secrets and cipher and associate the user identity with the port so that the ExpressRoute management code can access the MACsec secrets if needed.
117
114
@@ -126,7 +123,7 @@ Each ExpressRoute Direct instance has two physical ports. You can choose to enab
At this point, MACsec is enabled on the ExpressRoute Direct ports on Microsoft side. If you haven't configured it on your edge devices, you can proceed to configure them with the same MACsec secrets and cipher.
135
+
MACsec is now enabled on the ExpressRoute Direct ports on Microsoft side. If you haven't configured it on your edge devices, you can proceed to configure them with the same MACsec secrets and cipher.
139
136
140
-
3. (Optional) You can enable Secure Channel Identifier (SCI) on the ports.
137
+
1. (Optional) You can enable Secure Channel Identifier (SCI) on the ports.
At this point, MACsec is disabled on the ExpressRoute Direct ports on the Microsoft side.
162
+
MACsec is now disabled on the ExpressRoute Direct ports on the Microsoft side.
166
163
167
164
### Test connectivity
168
-
After you configure MACsec (including MACsec key update) on your ExpressRoute Direct ports, [check](expressroute-troubleshooting-expressroute-overview.md) if the BGP sessions of the circuits are up and running. If you don't have any circuit on the ports yet, please create one first and set up Azure Private Peering or Microsoft Peering of the circuit. If MACsec is misconfigured, including MACsec key mismatch, between your network devices and Microsoft's network devices, you won't see ARP resolution at layer 2 and BGP establishment at layer 3. If everything is configured properly, you should see the BGP routes advertised correctly in both directions and your application data flow accordingly over ExpressRoute.
165
+
166
+
After you configure MACsec (including MACsec key update) on your ExpressRoute Direct ports, [check](expressroute-troubleshooting-expressroute-overview.md) if the BGP sessions of the circuits are up and running. If you don't have any circuit on the ports yet, create one first and set up Azure Private Peering or Microsoft Peering of the circuit. If MACsec gets misconfigured, including MACsec key mismatch, between your network devices and Microsoft's network devices, you won't see ARP resolution at layer 2 or BGP establishment at layer 3. If everything is configured properly, you should see the BGP routes advertised correctly in both directions and your application data flow accordingly over ExpressRoute.
169
167
170
168
## Next steps
171
-
1.[Create an ExpressRoute circuit on ExpressRoute Direct](expressroute-howto-erdirect.md)
172
-
2.[Link an ExpressRoute circuit to an Azure virtual network](expressroute-howto-linkvnet-arm.md)
0 commit comments