ExpressRoute supports a couple of encryption technologies to ensure confidentiality and integrity of the data traversing between your network and Microsoft's network. By default traffic over an ExpressRoute connection is not encrypted.
Point-to-point encryption by MACsec FAQ
MACsec is an IEEE standard. It encrypts data at the Media Access control (MAC) level or Network Layer 2. You can use MACsec to encrypt the physical links between your network devices and Microsoft's network devices when you connect to Microsoft via ExpressRoute Direct. MACsec is disabled on ExpressRoute Direct ports by default. You bring your own MACsec key for encryption and store it in Azure Key Vault. You decide when to rotate the key.
Can I enable MACsec on my ExpressRoute circuit provisioned by an ExpressRoute provider?
No. MACsec encrypts all traffic on a physical link with a key owned by one entity (for example, customer). Therefore, it's available on ExpressRoute Direct only.
Can I encrypt some of the ExpressRoute circuits on my ExpressRoute Direct ports and leave other circuits on the same ports unencrypted?
No. Once MACsec is enabled all network control traffic, for example, the BGP data traffic, and customer data traffic are encrypted.
When I enable/disable MACsec or update MACsec key will my on-premises network lose connectivity to Microsoft over ExpressRoute?
Yes. For the MACsec configuration, we support the preshared key mode only. It means you need to update the key on both your devices and on Microsoft's (via our API). This change isn't atomic, so you lose connectivity when there's a key mismatch between the two sides. We strongly recommend that you schedule a maintenance window for the configuration change. To minimize the downtime, we suggest you update the configuration on one link of ExpressRoute Direct at a time after you switch your network traffic to the other link.
Does traffic continue to flow if there's a mismatch in MACsec key between my devices and Microsoft's?
No. If MACsec is configured and a key mismatch occurs, you lose connectivity to Microsoft. In other traffic doesn't fall back to an unencrypted connection, exposing your data.
Does enabling MACsec on ExpressRoute Direct degrade network performance?
MACsec encryption and decryption occur in hardware on the routers we use. There's no performance degradation on our side. However, you should check with the network vendor for the devices you use and see if MACsec has any performance implication.
Which cipher suites are supported for encryption?
We support the following standard ciphers:
Does ExpressRoute Direct MACsec support Secure Channel Identifier (SCI)?
Yes, you can set Secure Channel Identifier (SCI) on the ExpressRoute Direct ports. Refer to Configure MACsec.
End-to-end encryption by IPsec FAQ
IPsec is an IETF standard. It encrypts data at the Internet Protocol (IP) level or Network Layer 3. You can use IPsec to encrypt an end-to-end connection between your on-premises network and your virtual network (VNET) on Azure.
Can I enable IPsec in addition to MACsec on my ExpressRoute Direct ports?
Yes. MACsec secures the physical connections between you and Microsoft. IPsec secures the end-to-end connection between you and your virtual networks on Azure. You can enable them independently.
Can I use Azure VPN gateway to set up the IPsec tunnel over Azure Private Peering?
Yes. If you adopt Azure Virtual WAN, you can follow these steps to encrypt the end-to-end connection. If you have regular Azure VNET, you can follow these steps to establish an IPsec tunnel between Azure VPN gateway and your on-premises VPN gateway.
What is the throughput I'll get after enabling IPsec on my ExpressRoute connection?
If Azure VPN gateway is used, check the performance numbers here. If a third-party VPN gateway is used, check with the vendor for the performance numbers.
See Configure IPsec for more information about the IPsec configuration.
For more information about the MACsec configuration, see Configure MACsec.
For more information about the IPsec configuration, See Configure IPsec.
Submit and view feedback for