IEEE 802.1Xbx 2014
$92.08
IEEE Standard for Local and metropolitan area networks — Port-Based Network Access Control Amendment 1: MAC Security Key Agreement Protocol (MKA) Extensions
Published By | Publication Date | Number of Pages |
IEEE | 2014 | 107 |
Amendment Standard – Active. Media Access Control security (MACsec) Key Agreement protocol (MKA) data elements and procedures that provide additional security and manageability capabilities, including the ability to maintain secure communication while the operation of MKA is suspended, when used in conjunction with MACsec Cipher Suites that support Extended Packet Numbering are added in this amendment.
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | IEEE Std 802.1Xbx-2014 Front Cover |
3 | Title page |
5 | Important Notices and Disclaimers Concerning IEEE Standards Documents |
8 | Participants |
10 | Introduction |
11 | Contents |
13 | List of figures |
14 | List of tables |
15 | IMPORTANT NOTICE |
16 | 2. Normative references |
19 | 3. Definitions |
20 | 4. Abbreviations and acronyms |
21 | 5. Conformance 5.11 MKA options 5.11.4 In-service upgrades |
22 | 6. Principles of port-based network access control operation 6.2 Key hierarchy 6.2.4 Algorithm agility |
23 | 7. Port-based network access control applications 7.7.2 System configuration and operation |
24 | 9. MACsec Key Agreement protocol (MKA) 9.1 Protocol design requirements |
25 | 9.3.3 Derived keys |
27 | 9.4.3 Determining liveness 9.4.6 Active and passive participants |
28 | 9.5 Key server election |
29 | 9.6.1 MKPDU application data 9.7.1 MKPDU application data |
30 | 9.8 SAK generation, distribution, and selection 9.10.1 MKPDU application data |
31 | 9.15 MKA participant timer values 9.16 MKA management |
32 | 9.18 In-service upgrades 9.18.1 Initiating suspension |
33 | 9.18.2 Suspending 9.18.3 Suspended members |
34 | 9.18.4 Resuming operation |
35 | 9.18.5 XPN support 9.18.6 Managing in-service upgrades |
36 | 9.18.7 MKPDU application data 9.19 In-service upgrade examples |
37 | 9.19.1 Requested by end station in point-to-point CA 9.19.2 Initiated by Key Server in point-to-point CA |
38 | 9.19.3 Intermediate systems suspending multiple CAs |
39 | 9.19.4 Key Server suspends in a group CA |
40 | 11. EAPOL PDUs 11.5 EAPOL protocol version handling 11.11 EAPOL-MKA |
41 | 11.11.1 MKA parameter encoding |
44 | 11.12.3 MACsec Cipher Suites TLV |
46 | 12. PAE operation 12.1 Model of operation 12.2 KaY interfaces |
47 | 12.5 Logon Process 12.5.1 Controlling connectivity 12.5.2 Active and passive participation |
48 | 12.5.3 Network Identities 12.9 PAE management 12.9.2 Identifying PAEs and their capabilities |
50 | 13. PAE MIB 13.4 Security considerations 13.5 Definitions for PAE MIB |
99 | Annex A (normative) PICS Proforma A.9 MKA requirements and options |
100 | Annex B (informative) Bibliography |
102 | Annex H (informative) Test vectors H.1 KDF |
103 | H.2 CAK Key Derivation H.3 CKN Derivation |
104 | H.4 KEK Derivation H.5 ICK Derivation |
105 | H.6 SAK Derivation |
107 | Back Cover |