Shopping Cart

No products in the cart.

BS ISO/IEC/IEEE 8802-1X:2021:2022 Edition

$215.11

Telecommunications and exchange between information technology systems. Requirements for local and metropolitan area networks – Port-based network access control

Published By Publication Date Number of Pages
BSI 2022 294
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
2 undefined
6 Blank Page
7 Title page
9 Important Notices and Disclaimers Concerning IEEE Standards Documents
12 Participants
14 Introduction
15 Contents
19 Figures
21 Tables
22 1. Overview
1.1 Scope
1.2 Purpose
1.3 Introduction
23 1.4 Provisions of this standard
25 2. Normative references
27 3. Definitions
32 4. Acronyms and abbreviations
34 5. Conformance
5.1 Requirements terminology
5.2 Protocol Implementation Conformance Statement
35 5.3 Conformant systems and system components
5.4 PAE requirements
36 5.5 PAE options
5.6 Supplicant requirements
5.7 Supplicant options
5.7.1 Integration with IEEE Std 802.1AR
5.8 Authenticator requirements
5.9 Authenticator options
37 5.9.1 Integration with IEEE Std 802.1AR
5.10 MKA requirements
5.11 MKA options
5.11.1 Support for PSKs
5.11.2 Key Server support for Group CAs
38 5.11.3 CAK Cache
5.11.4 In-service upgrades
5.12 Virtual port requirements
39 5.13 Virtual port options
5.14 Announcement transmission requirements
5.15 Announcement transmission options
5.16 Announcement reception requirements
5.17 Announcement reception options
40 5.18 Requirements for SNMP access to the PAE MIB
5.19 Options for SNMP access to the PAE MIB
5.20 PAC requirements
5.21 System recommendations
5.22 Prohibitions
5.23 Requirement for YANG data model of a PAE
5.24 Options for YANG data model of a PAE
42 6. Principles of port-based network access control operation
43 6.1 Port-based network access control architecture
44 6.2 Key hierarchy
46 6.2.1 Key derivation function (KDF)
47 6.2.2 Using EAP for CAK key derivation
48 6.2.3 CAK caching and scope
6.2.4 Algorithm agility
49 6.3 Port Access Entity (PAE)
6.3.1 Authentication exchanges
50 6.3.2 Key agreement
6.3.3 Pre-shared keys
6.3.4 Interoperability and connectivity
51 6.3.5 Network announcements, identity, authentication requirements, and status
52 6.3.6 Multi-access LANs
6.4 Port Access Controller (PAC)
53 6.4.1 Uncontrolled Port transmission and reception
6.4.2 Controlled Port transmission and reception
54 6.4.3 PAC management
6.5 Link aggregation
55 6.6 Use of this standard by IEEE Std 802.11
56 7. Port-based network access control applications
7.1 Host access with physically secure LANs
57 7.1.1 Assumptions and requirements
7.1.2 System configuration and operation
58 7.1.3 Connectivity to unauthenticated systems
59 7.2 Infrastructure support with physically secure LANs
60 7.2.1 Assumptions and requirements
61 7.2.2 System configuration and operation
7.3 Host access with MACsec and point-to-point LANs
7.3.1 Assumptions and requirements
62 7.3.2 System configuration and operation
7.3.3 Connectivity to unauthenticated systems
7.4 Use with MACsec to support infrastructure LANs
63 7.4.1 Assumptions and requirements
64 7.4.2 System configuration and operation
7.4.3 Connectivity to unauthenticated systems
7.5 Host access with MACsec and a multi-access LAN
65 7.5.1 Assumptions and requirements
7.5.2 System configuration and operation
66 7.5.3 Connectivity to unauthenticated systems
67 7.6 Group host access with MACsec
68 7.6.1 Assumptions and requirements
7.6.2 System configuration and operation
7.7 Use with MACsec to support virtual shared media infrastructure LANs
7.7.1 Assumptions and requirements
69 7.7.2 System configuration and operation
71 8. Authentication using EAP
72 8.1 PACP Overview
73 8.2 Example EAP exchanges
74 8.3 PAE higher layer interface
75 8.4 PAE Client interface
77 8.5 EAPOL transmit and receive
8.6 Supplicant and Authenticator PAE timers
78 8.7 Supplicant PACP state machine, variables, and procedures
8.8 Supplicant PAE counters
79 8.9 Authenticator PACP state machine, variables, and procedures
80 8.10 Authenticator PAE counters
81 8.11 EAP methods
8.11.1 MKA and EAP methods
82 8.11.2 Integration with IEEE Std 802.1AR and EAP methods
83 9. MACsec Key Agreement protocol (MKA)
84 9.1 Protocol design requirements
85 9.2 Protocol support requirements
9.2.1 Random number generation
9.2.2 SC identification
9.3 MKA key hierarchy
86 9.3.1 CAK identification
9.3.2 CAK Independence
9.3.3 Derived keys
88 9.4 MKA transport
9.4.1 Message authentication
89 9.4.2 Member identification and message numbers
9.4.3 Determining liveness
90 9.4.4 MKPDU information elements and application data
9.4.5 Addressing
9.4.6 Active and passive participants
91 9.5 Key server election
92 9.5.1 MKPDU application data
9.6 Use of MACsec
93 9.6.1 MKPDU application data
9.7 Cipher suite selection
9.7.1 MKPDU application data
94 9.8 SAK generation, distribution, and selection
95 9.8.1 SAK generation
9.8.2 Use of AES Key Wrap
96 9.8.3 MKPDU application data
9.9 SA assignment
9.9.1 MKPDU application data
9.10 SAK installation and use
97 9.10.1 MKPDU application data
98 9.11 Connectivity change detection
9.12 CA formation and group CAK distribution
9.12.1 Use of AES Key Wrap
9.12.2 MKPDU application data
99 9.13 Secure announcements
9.13.1 MKPDU application data
9.14 MKA participant creation and deletion
100 9.15 MKA participant timer values
101 9.16 MKA management
103 9.17 MKA SAK distribution examples
9.17.1 Two participants
9.17.2 Another participant joins
104 9.18 In-service upgrades
9.18.1 Initiating suspension
105 9.18.2 Suspending
9.18.3 Suspended members
106 9.18.4 Resuming operation
9.18.5 XPN support
107 9.18.6 Managing in-service upgrades
108 9.18.7 MKPDU application data
9.19 In-service upgrade examples
9.19.1 Requested by end station in point-to-point CA
109 9.19.2 Initiated by Key Server in point-to-point CA
110 9.19.3 Intermediate systems suspending multiple CAs
9.19.4 Key Server suspends in a group CA
111 10. Network announcements
10.1 Announcement information
114 10.2 Making and requesting announcements
116 10.3 Receiving announcements
10.4 Managing announcements
118 11. EAPOL PDUs
11.1 EAPOL PDU transmission, addressing, and protocol identification
11.1.1 Destination MAC address
120 11.1.2 Source MAC address
11.1.3 Priority
11.1.4 Ethertype use and encoding
121 11.2 Representation and encoding of octets
11.3 Common EAPOL PDU structure
11.3.1 Protocol Version
11.3.2 Packet Type
122 11.3.3 Packet Body Length
11.3.4 Packet Body
11.4 Validation of received EAPOL PDUs
123 11.5 EAPOL protocol version handling
124 11.6 EAPOL-Start
125 11.7 EAPOL-Logoff
11.8 EAPOL-EAP
11.9 EAPOL-Key
126 11.10 EAPOL-Encapsulated-ASF-Alert
11.11 EAPOL-MKA
128 11.11.1 MKA parameter encoding
135 11.11.2 Validation of MKPDUs
11.11.3 Encoding MKPDUs
136 11.11.4 Decoding MKPDUs
11.12 EAPOL-Announcement
138 11.12.1 Network Identity (NID) Set TLV
11.12.2 Access Information TLV
139 11.12.3 MACsec Cipher Suites TLV
140 11.12.4 Key Management Domain TLV
11.12.5 Organizationally Specific and Organizationally Specific Set TLVs
141 11.12.6 Validation of EAPOL-Announcements
11.12.7 Encoding EAPOL-Announcements
11.12.8 Decoding EAPOL-Announcements
142 11.13 EAPOL-Announcement-Req
143 12. PAE operation
12.1 Model of operation
145 12.2 KaY interfaces
147 12.3 CP state machine interfaces
148 12.4 CP state machine
12.4.1 CP state machine variables and timers
12.5 Logon Process
150 12.5.1 Controlling connectivity
12.5.2 Active and passive participation
151 12.5.3 Network Identities
12.5.4 Session statistics
152 12.6 CAK cache
153 12.7 Virtual port creation and deletion
154 12.8 EAPOL Transmit and Receive Process
12.8.1 EAPOL frame reception statistics
155 12.8.2 EAPOL frame reception diagnostics
12.8.3 EAPOL frame transmission statistics
156 12.9 PAE management
12.9.1 System level PAE management
157 12.9.2 Identifying PAEs and their capabilities
12.9.3 Initialization
159 13. PAE MIB
13.1 The Internet Standard Management Framework
13.2 Structure of the MIB
13.3 Relationship to other MIBs
13.3.1 System MIB Group
13.3.2 Relationship to the Interfaces MIB
161 13.3.3 Relationship to the MAC Security MIB
168 13.4 Security considerations
13.5 Definitions for PAE MIB
218 14. YANG Data Model
14.1 PAE management using YANG
219 14.2 Security considerations
220 14.3 802.1X YANG model structure
221 14.4 Relationship to other YANG data models
14.4.1 General
222 14.4.2 Relationship to the System Management YANG model
223 14.4.3 Relationship to the Interface Management YANG model
230 14.4.4 The Interface Stack Models
235 14.5 Definition of the IEEE 802.1X YANG data model
14.5.1 ieee802-dot1x YANG tree schema
238 14.5.2 ieee802-dot1x-types YANG module
242 14.5.3 ieee802-dot1x YANG module definition
267 14.6 YANG data model use in network access control applications
14.6.1 General
14.6.2 Host access with a physically secure point-to-point LAN (7.1)
268 14.6.3 Network access point supporting a physically secure point-to-point LAN (7.1)
14.6.4 Network access point supporting MACsec on a point-to-point LAN (7.3)
270 14.6.5 Network access point supporting MACsec on a multi-access LAN (7.5)
14.6.6 Network access point supporting MACsec over LAG (11.5 of IEEE Std 802.1AE-2018)
272 Annex A (normative) PICS proforma
A.1 Introduction
A.2 Abbreviations and special symbols
273 A.3 Instructions for completing the PICS proforma
275 A.4 PICS proforma for IEEE 802.1X
276 A.5 Major capabilities and options
A.6 PAE requirements and options
277 A.7 Supplicant requirements and options
A.8 Authenticator requirements and options
A.9 MKA requirements and options
279 A.10 Announcement transmission requirements
A.11 Announcement reception requirements
A.12 Management and remote management
A.13 Virtual ports
280 A.14 PAC
A.15 YANG requirements and options
281 Annex B (informative) Bibliography
284 Annex C (normative) State diagram notation
286 Annex D (informative) IEEE 802.1X EAP and RADIUS usage guidelines
D.1 EAP Session-Id
D.2 RADIUS Attributes for IEEE 802 Networks
287 Annex E (informative) Support for ‘Wake-on-LAN’ protocols
288 Annex F (informative) Unsecured multi-access LANs
290 Annex G (informative) Test vectors
G.1 KDF
291 G.2 CAK Key Derivation
G.3 CKN Derivation
292 G.4 KEK Derivation
G.5 ICK Derivation
293 G.6 SAK Derivation
BS ISO/IEC/IEEE 8802-1X:2021
$215.11