Home>IEEE standards>IEEE Std 802.1X-2020 pdf free

IEEE Std 802.1X-2020 pdf free

IEEE Std 802.1X-2020 pdf free.IEEE Standard for Local and Metropolitan Area Networks-Port-Based Network Access Control.
IEEE Std 802.1X specifics the use of EAP. the Extensible Authentication Protocol (TETF RFC 3748 lB 141’), to support authentication using a centrally administered Authentication Server and defines EAP encapsulation over LANs (EAPOL. Clause II) to convey the necessary exchanges between peer PAEs attached to a LAN.
Where communication over the LAN connecting a Controlled Port to its peer(s) is physically secure, no additional protocol is required to protect their communication. This mode of operation is supported by this standard. More commonly intrusion into the LAN communication is a principal security threat, and the result of mutual authentication is not simply Controlled Port authorization to transmit and receive data, but secure distribution of master keys and associated data to the communicating peers. Proof of possession of master keys subsequently serves as prool’ of mutual authentication in key agreement protocols. These protocols generate keys that are used to cryptographically protect data frames transmitted and received by the Controlled Port. IEEE SW 802.11” Wireless LANs specifies protocols that associate wireless stations with access points and initiate mutual authentication using the procedures specified in this standard, the subsequent generation of keys to protect data transfer, and the cryptographic methods that protect data frames using those keys. IEEE Std 802.IAE MAC Security (MACsee) specifies cryptographic support of the Controlled Port for other media access methods. Authenticated key agreement for MAC Security, as spccitied in this standard, specifics the generation of the Secure Association Keys (SAKs) used by MACsec.
Use of the Controlled Port can be restricted by access controls bound to the results of authentication and distributed via AAA protocols such as Diameter (IETF RFC 6733 1B251) or RADIUS (IETF RFC 2865 11361). Attributes supporting certain port-based network access control scenarios are described in IETF RFC 3580113131. IETF RFC 4675 lB 17J. IETF RFC 4849 [BlKJ, IETF RFC 7268 113281. and IETF RFC 8044 113291.
Clause 7 illustrates use of the above components and protocols in typical network access control scenarios.
1.4 Provisions of this standard
The scope (1.1) of this standard is addressed by detailed specification of the following:
a) The principles of port-based network access control operation, identifying the protocol components that compose a port-based network access control implementation (Clause 6).
b) A PAE component. that supports authentication, authorization, and the key agreement functionality required by IEEE Std 802.IAE to allow a MAC Security Entity (SecY) to protect communication through a port (6.3, Clause 12).
c) A Port Access Controller (PAC) component. that controls communication where the attached LAN is deemed to be physically secure and provides point-to-point connectivity (6.4).IEEE Std 802.1X pdf download.

Related PowerPoint Templates

Template Categories