MACsec on MikroTik - Configuring Hop-by-Hop Layer 2 Encryption
Wilmer Almazan / The Network Trip via YouTube
Overview
Learn how to implement Layer 2 security through a detailed 24-minute technical video that breaks down the MACsec protocol and its implementation in multi-hop networks using MikroTik devices. Explore the vulnerabilities present in unencrypted traffic across multiple hops, followed by comprehensive configuration steps for enabling MACsec protection. Through practical demonstrations, compare network behavior before and after MACsec implementation while understanding how the protocol secures data at each network hop. Master the essential aspects of network security including MACsec protocol fundamentals, multi-hop network vulnerabilities, detailed MikroTik device configuration, and real-world implementation strategies for Layer 2 network protection.
Syllabus
MACSec Mikrotik - Hop by Hop Encryption
Taught by
Wilmer Almazan / The Network Trip