Skip to content

Commit fe67ac3

Browse files
authored
Add text about default encryption
1 parent df5fc1b commit fe67ac3

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/expressroute/expressroute-about-encryption.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.author: duau
1212
---
1313
# ExpressRoute encryption
1414

15-
ExpressRoute supports a couple of encryption technologies to ensure confidentiality and integrity of the data traversing between your network and Microsoft's network.
15+
ExpressRoute supports a couple of encryption technologies to ensure confidentiality and integrity of the data traversing between your network and Microsoft's network. By default traffic over an ExpressRoute connection is not encrypted.
1616

1717
## Point-to-point encryption by MACsec FAQ
1818
MACsec is an [IEEE standard](https://1.ieee802.org/security/802-1ae/). It encrypts data at the Media Access control (MAC) level or Network Layer 2. You can use MACsec to encrypt the physical links between your network devices and Microsoft's network devices when you connect to Microsoft via [ExpressRoute Direct](expressroute-erdirect-about.md). MACsec is disabled on ExpressRoute Direct ports by default. You bring your own MACsec key for encryption and store it in [Azure Key Vault](../key-vault/general/overview.md). You decide when to rotate the key. See other FAQs below.
@@ -46,4 +46,4 @@ If Azure VPN gateway is used, check the [performance numbers here](../vpn-gatewa
4646
## Next steps
4747
See [Configure MACsec](expressroute-howto-macsec.md) for more information about the MACsec configuration.
4848

49-
See [Configure IPsec](site-to-site-vpn-over-microsoft-peering.md) for more information about the IPsec configuration.
49+
See [Configure IPsec](site-to-site-vpn-over-microsoft-peering.md) for more information about the IPsec configuration.

0 commit comments

Comments
 (0)