IEEE 802.1X 2001
$69.88
IEEE Standard for Port Based Network Access Control
Published By | Publication Date | Number of Pages |
IEEE | 2001 | 142 |
New IEEE Standard – Inactive – Superseded. This IEEE Standards product is part of the 802 family on LAN/MAN. Port-based network access control makes use of the physical access characteristics of IEEE 802 Local Area Networks (LAN) infrastructures in order to provide a means of authenticating and authorizing devices attached to a LAN port that has point-to-point connection characteristics, and of preventing access to that port in cases in which the authentication and authorization process fails.
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | Title Page |
3 | Introduction |
5 | Participants |
7 | CONTENTS |
9 | 1. Overview 1.1 Scope 1.2 Purpose |
10 | 2. References |
13 | 3. Definitions 3.1 Definitions 4. Acronyms and abbreviations 5. Conformance 5.1 Static conformance requirements |
14 | 5.2 Options |
15 | 6. Principles of operation 6.1 Systems, Ports, and system roles |
16 | 6.2 Port access entity 6.3 Controlled and uncontrolled access |
20 | 6.4 Unidirectional and bidirectional control |
21 | 6.5 Use of Port Access Control with IEEE Std 802.3, 2000 Edition 7. EAP encapsulation over LANs (EAPOL) 7.1 Transmission and representation of octets |
22 | 7.2 EAPOL frame format for 802.3/Ethernet 7.3 EAPOL frame format for Token Ring/FDDI 7.4 Tagging EAPOL frames |
23 | 7.5 EAPOL PDU field and parameter definitions |
25 | 7.6 Key Descriptor format |
27 | 7.7 EAP packet format—informative |
28 | 7.8 EAPOL addressing |
29 | 7.9 Use of EAPOL in shared media LANs 8. Port Access Control 8.1 Purpose 8.2 Scope |
30 | 8.3 Overview of Port Access Entity operation |
31 | 8.4 Protocol operation |
39 | 8.5 EAPOL state machines |
64 | 9. Management of Port Access Control 9.1 Management functions |
65 | 9.2 Managed objects |
66 | 9.3 Data types 9.4 Authenticator PAE managed objects |
74 | 9.5 Supplicant PAE managed objects |
77 | 9.6 System managed objects |
78 | 10. Management protocol 10.1 Introduction 10.2 The SNMP Management Framework |
79 | 10.3 Security considerations 10.4 Structure of the MIB |
83 | 10.5 Relationship to other MIBs |
84 | 10.6 Definitions for Port Access Control MIB |
115 | Annex A: PICS Proforma |
122 | Annex B: Scenarios for the use of Port-Based Network Access Control |
126 | Annex C: Design considerations and background material for Port-Based Network Access Control |
133 | Annex D: IEEE 802.1X RADIUS Usage Guidelines |
142 | Annex E: Bibliography |