You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-[Testcase : Macsec feature interop with other protocols](#testcase--macsec-feature-interop-with-other-protocols)
20
+
-[Verify Port Channel is created with macsec configuration](#verify-port-channel-is-created-with-macsec-configuration)
21
+
-[Verify LLDP neighbors are created with macsec configuration](#verify-lldp-neighbors-are-created-with-macsec-configuration)
22
+
-[Verify the BGP neighbourship is created with macsec configuration](#verify-the-bgp-neighbourship-is-created-with-macsec-configuration)
23
+
-[Verify PFC in MACsec](#verify-pfc-in-macsec)
23
24
-[Bypass mode](#bypass-mode)
24
25
-[Encrypt mode](#encrypt-mode)
25
26
-[Strict mode](#strict-mode)
26
-
-[Verify SNMP request/response works across interface with macsec configuration[Done]](#verify-snmp-requestresponse-works-across-interface-with-macsec-configuration-done)
27
-
-[Testcase : Deployment usecases and fault handling scenario's[Done]](#testcase--deployment-usecases-and-fault-handling-scenarios-done)
28
-
-[Link flap on an interface with macsec configured[Done]](#link-flap-on-an-interface-with-macsec-configured-done)
29
-
-[Link flap on a portchannel member which has macsec configured[Done]](#link-flap-on-a-portchannel-member-which-has-macsec-configured-done)
30
-
-[Testcases: Operation portchannel remove and re-add members to fix CRC error[Removed]](#testcases-operation-portchannel-remove-and-re-add-members-to-fix-crc-error-removed)
31
-
-[MACsec session cannot be established under wrong MKA configuration[Done]](#macsec-session-cannot-be-established-under-wrong-mka-configuration-done)
32
-
-[Config reload done on DUT with macsec configuration[Done]](#config-reload-done-on-dut-with-macsec-configuration-done)
33
-
-[Everflow, port mirroring on macsec enabled interfaces[Removed]](#everflow-port-mirroring-on-macsec-enabled-interfaces-removed)
34
-
-[Testcase : Macsec scenario's for multi-asic, multi-dut[Not start]](#testcase--macsec-scenarios-for-multi-asic-multi-dut-not-start)
27
+
-[Verify SNMP request/response works across interface with macsec configuration](#verify-snmp-requestresponse-works-across-interface-with-macsec-configuration)
28
+
-[Testcase : Deployment usecases and fault handling scenario's](#testcase--deployment-usecases-and-fault-handling-scenarios)
29
+
-[Link flap on an interface with macsec configured](#link-flap-on-an-interface-with-macsec-configured)
30
+
-[Link flap on a portchannel member which has macsec configured](#link-flap-on-a-portchannel-member-which-has-macsec-configured)
31
+
-[Testcases: Operation portchannel remove and re-add members to fix CRC error](#testcases-operation-portchannel-remove-and-re-add-members-to-fix-crc-error)
32
+
-[MACsec session cannot be established under wrong MKA configuration](#macsec-session-cannot-be-established-under-wrong-mka-configuration)
33
+
-[Config reload done on DUT with macsec configuration](#config-reload-done-on-dut-with-macsec-configuration)
34
+
-[Everflow, port mirroring on macsec enabled interfaces](#everflow-port-mirroring-on-macsec-enabled-interfaces)
35
+
-[Testcase : Macsec scenario's for multi-asic, multi-dut](#testcase--macsec-scenarios-for-multi-asic-multi-dut)
35
36
-[Testcase : Scale tests](#testcase--scale-tests)
36
-
-[Large number of interfaces having macsec enabled on the DUT/linecard [Not start]](#large-number-of-interfaces-having-macsec-enabled-on-the-dutlinecard-not-start)
37
-
-[Simultaneous rekeying in all macsec sessions [Not start]](#simultaneous-rekeying-in-all-macsec-sessions-not-start)
38
-
-[Macsec enabled on all interfaces and the DUT is rebooted [Not start]](#macsec-enabled-on-all-interfaces-and-the-dut-is-rebooted-not-start)
37
+
-[Large number of interfaces having macsec enabled on the DUT/linecard](#large-number-of-interfaces-having-macsec-enabled-on-the-dutlinecard)
38
+
-[Simultaneous rekeying in all macsec sessions](#simultaneous-rekeying-in-all-macsec-sessions)
39
+
-[Macsec enabled on all interfaces and the DUT is rebooted](#macsec-enabled-on-all-interfaces-and-the-dut-is-rebooted)
@@ -243,7 +270,7 @@ All VMs and PTF docker in the host need to install PTF NN agent. So, SONiC-mgmt-
243
270
4. VM1 should receive at least one expected above packet
244
271
5. Check the interface stats with macsec counters.
245
272
246
-
#### Refresh SAK[Ongoing]
273
+
#### Refresh SAK
247
274
248
275
The thresholds of rekey packet number are `0xC0000000ULL` to 32bits packet number and `0xC000000000000000ULL` to 64bits packet number(XPN). It's impossible to really send many packets to trigger the rekey action. So, We use the attribute `next_pn` of `MACSEC_EGRESS_SA` in APP_DB to cheat MKA protocol for rekey action.
0 commit comments