If the preshared keys don't match the decryption just does not work so the connection will fail.
------------------------------
Steve Puluka BSEET - Juniper Ambassador
IP Architect - DQE Communications Pittsburgh, PA (Metro Ethernet & ISP)
http://puluka.com/home------------------------------
Original Message:
Sent: 08-10-2021 14:49
From: Unknown User
Subject: Question on the MACSec CKN
Hi Steve.
I was wondering how both MACsec endpoints are able to confirm that their configured CKNs are the same.
--Deepak
Original Message:
Sent: 08-08-2021 07:58
From: STEVE PULUKA
Subject: Question on the MACSec CKN
The CKN is just an element of the mutual communications between the two nodes. Does the configuration example showing the use help?
https://www.juniper.net/documentation/us/en/software/junos/security-services/topics/task/macsec.html
------------------------------
Steve Puluka BSEET - Juniper Ambassador
IP Architect - DQE Communications Pittsburgh, PA (Metro Ethernet & ISP)
http://puluka.com/home
Original Message:
Sent: 08-07-2021 06:51
From: Unknown User
Subject: Question on the MACSec CKN
Hi.
I have a MACSec question.
The CAK is used to encrypt MACSec control messages
The SAK is used to encrypt MACSec data packets.
What is the CKN used for? How is it communicated in MACSec messages?
Thanks,
Deepak