Chapter 13. Using MACsec to encrypt layer-2 traffic in the same physical network