Shopping Cart

No products in the cart.

IEEE 802.1Xbx 2014

$92.08

IEEE Standard for Local and metropolitan area networks — Port-Based Network Access Control Amendment 1: MAC Security Key Agreement Protocol (MKA) Extensions

Published By Publication Date Number of Pages
IEEE 2014 107
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

Amendment Standard – Active. Media Access Control security (MACsec) Key Agreement protocol (MKA) data elements and procedures that provide additional security and manageability capabilities, including the ability to maintain secure communication while the operation of MKA is suspended, when used in conjunction with MACsec Cipher Suites that support Extended Packet Numbering are added in this amendment.

PDF Catalog

PDF Pages PDF Title
1 IEEE Std 802.1Xbx-2014 Front Cover
3 Title page
5 Important Notices and Disclaimers Concerning IEEE Standards Documents
8 Participants
10 Introduction
11 Contents
13 List of figures
14 List of tables
15 IMPORTANT NOTICE
16 2. Normative references
19 3. Definitions
20 4. Abbreviations and acronyms
21 5. Conformance
5.11 MKA options
5.11.4 In-service upgrades
22 6. Principles of port-based network access control operation
6.2 Key hierarchy
6.2.4 Algorithm agility
23 7. Port-based network access control applications
7.7.2 System configuration and operation
24 9. MACsec Key Agreement protocol (MKA)
9.1 Protocol design requirements
25 9.3.3 Derived keys
27 9.4.3 Determining liveness
9.4.6 Active and passive participants
28 9.5 Key server election
29 9.6.1 MKPDU application data
9.7.1 MKPDU application data
30 9.8 SAK generation, distribution, and selection
9.10.1 MKPDU application data
31 9.15 MKA participant timer values
9.16 MKA management
32 9.18 In-service upgrades
9.18.1 Initiating suspension
33 9.18.2 Suspending
9.18.3 Suspended members
34 9.18.4 Resuming operation
35 9.18.5 XPN support
9.18.6 Managing in-service upgrades
36 9.18.7 MKPDU application data
9.19 In-service upgrade examples
37 9.19.1 Requested by end station in point-to-point CA
9.19.2 Initiated by Key Server in point-to-point CA
38 9.19.3 Intermediate systems suspending multiple CAs
39 9.19.4 Key Server suspends in a group CA
40 11. EAPOL PDUs
11.5 EAPOL protocol version handling
11.11 EAPOL-MKA
41 11.11.1 MKA parameter encoding
44 11.12.3 MACsec Cipher Suites TLV
46 12. PAE operation
12.1 Model of operation
12.2 KaY interfaces
47 12.5 Logon Process
12.5.1 Controlling connectivity
12.5.2 Active and passive participation
48 12.5.3 Network Identities
12.9 PAE management
12.9.2 Identifying PAEs and their capabilities
50 13. PAE MIB
13.4 Security considerations
13.5 Definitions for PAE MIB
99 Annex A (normative) PICS Proforma
A.9 MKA requirements and options
100 Annex B (informative) Bibliography
102 Annex H (informative) Test vectors
H.1 KDF
103 H.2 CAK Key Derivation
H.3 CKN Derivation
104 H.4 KEK Derivation
H.5 ICK Derivation
105 H.6 SAK Derivation
107 Back Cover
IEEE 802.1Xbx 2014
$92.08