Standard

IEEE 8802-1X-2021

Current

Existing or new amendments and versions must be purchased separately.

Language
Services

Abstract

Adoption Standard - Active. Port-based network access control allows a network administrator to restrict the use of IEEE 802(R) LAN service access points (ports) to secure communication between authenticated and authorized devices. This standard specifies a common architecture, functional elements, and protocols that support mutual authentication between the clients of ports attached to the same LAN and that secure communication between the ports, including the media access method independent protocols that are used to discover and establish the security associations used by IEEE 802.1AE(TM) MAC Security.

Products specifications

  • Standard from IEEE/ISO/IEC
  • Published:
  • Document type: IS
  • Pages
  • Publisher: IEEE/ISO/IEC
  • Distributor: IEEE/ISO/IEC
  • ICS: 35.110
  • National Committee: IEEE Computer Society / LAN/MAN Standards Committee

Product Relations

  • Refers: IEEE 802.11-2020
  • Refers: IEEE 802.1AX-2020
  • Refers: IEEE 802.1AE-2018
  • Refers: IEEE 802.3-2018
  • Refers: IEEE 802.1AR-2018
  • Refers: IEEE 802.1Q-2018
  • Refers: IEEE 802.1Q-2018
  • Refers: IEEE 802d-2017
  • Refers: IEEE 802.1AC-2016
  • Refers: IEEE 802.1AB-2016
  • Refers: IEEE 802.2-1989
  • Refers: DMTF, Alert Standard Format (ASF) Specification, Version 2.0, 23 April 2003.
  • Refers: IETF RFC 2863, The Interfaces Group MIB using SMIv2, McCloghrie, K., and Kastenholz, F., June 2000.
  • Refers: iana-if-type YANG Module, Internet Assigned Numbers Authority
  • Refers: IETF RFC 8446, The Transport Layer Security (TLS) Protocol Version 1.3, Rescorla, E., August 2018.
  • Refers: IETF RFC 8343, A YANG Data Model for Interface Management, Bjorklund, M., March 2018.
  • Refers: IETF RFC 7950, The YANG 1.1 Data Modeling Language, Bjorklund, M., editor., August 2016.
  • Refers: IETF RFC 2579, STD 58, Textual Conventions for Version 2 of the Simple Network Management Protocol (SNMPv2), McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J., Rose, M., and Waldbusser, S., April 1999.
  • Refers: IETF RFC 5216, The EAP-TLS Authentication Protocol, Simon, D., Aboba, B., and Hurst, R., March 2008.
  • Refers: IETF RFC 4346, The Transport Layer Security (TLS) Protocol Version 1.3, Diercks, T., Rescorla, E., April 2006.
  • Refers: IETF RFC 2578, STD 58, Structure of Management Information for Version 2 of the Simple Network Management Protocol (SNMPv2), McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J., Rose, M., and Waldbusser, S., April 1999.
  • Refers: IETF RFC 7170, Tunnel Extensible Authentication Protocol (TEAP) Version 1, Zhou, H., Cam-Winget, N., Salowey, J., and Hanna, S., May 2014.
  • Refers: IETF RFC 4493, The AES-CMAC Algorithm, Song, J.H., Lee, J., and Iwata, T., June 2006.
  • Refers: IETF RFC 3418, STD 62, Management Information Base (MIB) for the Simple Network Management Protocol (SNMP), Preshun, R., Case, J., McCloghrie, K., Rose, M., Waldbusser, S., December 2002.
  • Refers: IETF RFC 5247, Extensible Authentication Protocol (EAP) Key Management Framework, Aboba, B., Simon, D., and Eronen, P., October 2007.
  • Refers: IETF RFC 3394, Advanced Encryption Standard (AES) Key Wrap Algorithm, J. Schaad, and Housley R., September 2002.
  • Refers: IETF RFC 7317, A YANG Data Model for System Management, Bierman A., and Bjorklund M., August 2014.
  • Refers: IETF RFC 2580, STD 58, Conformance Statements for SMIv2, McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J., Rose, M., and Waldbusser, S., April 1999.
  • Refers: ISO/IEC 18033-3: 2010, Information technology-Security techniques—Encryption algorithms-Part 3:Block ciphers.
  • Refers: NIST Special Publication 800-108, Recommendation for Key Derivation Using Pseudorandom Functions, Lily Chen, October 2009.
  • Refers: IETF RFC 3629, STD 63, UTF-8, a transformation format of ISO 10646, Yergeau, F., November 2003.