The Security Task Group specifies functionality to support secure communication between devices (end stations and bridges) attached to IEEE 802 LANs.
- IEEE Std 802.1X Port-Based Network Access Control specifies the use of industry standard authentication and authorization protocols to support network access control and the creation of secure infrastructures. It specifies the MACsec Key Agreement (MKA) protocol used by IEEE Std 802.1AE.
- IEEE Std 802.1AE MAC Security (MACsec) specifies the use of cryptographic Cipher Suites to ensure the authenticity, integrity (and optionally confidentiality) of the data (and other parameters) of the MAC Service and Internal Sublayer Service (as specified by IEEE Std 802.1AC and used within the bridging architectures specified by IEEE Std 802.1Q).
- IEEE Std 802.1AR Secure Device Identity specifies authentication credentials (DevIDs) designed to be used by IEEE 802 LAN-attached devices in conjunction with industry standard authentication, provisioning, and enrollment protocols including those identified by IEEE Std 802.1X.
Meetings and Conference Calls
The Security Task Group meets at most IEEE 802 plenary meetings and interim meetings of the 802.1 Working Group. Conference calls are held as needed. All meeting and conference call attendees are expected to review the IEEE patent policy prior to participating, and to act accordingly.
Participation in IEEE 802.1 meetings and conference calls is open to all, and not limited to IEEE or IEEE SA members. Voting membership and effective participation requires regular attendance at our face to face meetings, but the 802.1 Working Group has a long standing policy of considering comments from non-members, who are welcome to participate by joining the email list and submitting “Comments (with abstain)” ballots.
Minutes of Security Task Group meetings are included in the Working Group minutes for plenary and interim meetings. This page provides an index including recent Security Task Group teleconference minutes.
Access to the draft standards, ballot comments, and dispositions of comments referenced on this website is restricted to Working Group participants. Agendas, minutes, presentations and other input documents are publicly accessible.
Published standards are available for purchase from the IEEE or (after 6 months following publication) are available free through the IEEE Get Program. Individual document pages on this website provide links.
- P802.1Xck: Port-Based Network Access Control—Amendment 2: YANG Data Model
- P802.1AR-Rev: Secure Device Identity (Revision)
- P802E: Recommended Practice for Privacy Considerations for IEEE Technologies
- P802.1AE-Rev: MAC Security (MACsec) (Revision)
- 802.1AEcg–2017: Media Access Control (MAC) Security—Amendment 3: Ethernet Data Encryption devices
- 802.1Xbx–2014: Port-Based Network Access Control—Amendment 1: MAC Security Key Agreement Protocol (MKA) Extensions
- 802.1AEbw–2013: Media Access Control (MAC) Security—Amendment 2: Extended Packet Numbering
- 802.1AEbn–2011: Media Access Control (MAC) Security—Amendment 1: Galois Counter Mode—Advanced Encryption Standard—256 (GCM–AES–256) Cipher Suite
- 802.1X: Port-Based Network Access Control
- 802.1AR: Secure Device Identity
- 802.1AE: Media Access Control (MAC) Security
Withdrawn and Archived Projects
- P802.1ARce: Secure Device Identity—Amendment 1: SHA–384 and P–384 Elliptic Curve. Replaced by P802.1AR-Rev.
- P802.1af: Port-Based Network Access Control—Amendment: Authenticated Key Agreement for Media Access Control (MAC) Security. Merged into 802.1X–2010.
- 802.1X–2004: Port-Based Network Access Control. Developed by the Interworking Task Group, revised by 802.1X–2010.
- 802.1X–2001: Port-Based Network Access Control. Developed by the Interworking Task Group, revised by 802.1X–2004.