Chapter 9. Using MACsec to encrypt layer-2 traffic in the same physical network