Security

802.1AR: Secure Device Identity

Local Area Networks (LANs) are often deployed in networks that provide publicly accessible services or cannot be completely physically secured. Protocols that configure, manage, and regulate access to these networks typically run over the networks themselves. Secure and predictable network operation depends on authenticating each device attached to and participating in the network, so that… read more »

Security Task Group Minutes

Minutes of the Security Task Group meetings at IEEE 802 plenary and IEEE 802.1 interim meetings are included in the 802.1 Working Group minutes. The Working Group minutes and plenary slides record all formal motions and voting for the progression of work. Teleconferences are minuted separately. Decisions reached when resolving ballot comments are recorded in… read more »

Security Task Group Agenda

The Security Task Group agenda gives precedence to formally submitted maintenance requests on published standards, approved projects, PAR (Project Authorization Request) development previously approved by 802.1, and other matters arising, in that order. Requests for agenda items or time to present should be emailed to the Task Group chair Mick Seaman. Each presentation must be… read more »

802.1X: Port-Based Network Access Control

Full title: IEEE Standard for Local and metropolitan area networks–Port-Based Network Access Control IEEE 802 LANs are deployed in networks that convey or provide access to critical data, that support mission critical applications, or that charge for service. Protocols that configure, manage, and regulate access to these networks and network-based services and applications typically run… read more »

802.1Xbx-2014: Port-Based Network Access Control–MKA Extensions

Full title: IEEE Standard for Local and metropolitan area networks–Port-Based Network Access Control–Amendment 1: MAC Security Key Agreement Protocol (MKA) Extensions This amendment to IEEE Std 802.1X–2010, added MKA capabilities made possible by the IEEE Std 802.1AEbw-2013 addition of extended packet numbering Cipher Suites to IEEE Std 802.1AE MAC Security. Secure connectivity association (CA) members… read more »

802.1AEcg-2017: MAC Security (MACsec)–Ethernet Data Encryption devices

Full title: IEEE Standard for Local and metropolitan area networks–Media Access Control (MAC) Security–Amendment 3: Ethernet Data Encryption devices This amendment to IEEE Std 802.1AE–2006 (as previously amended by 802.1AEbn and 802.1AEbw) specified the use of Media Access Control (MAC) security in two port bridges (EDEs) that provide transparent secure connectivity for customer bridges or… read more »

802.1AEbw-2013: MAC Security (MACsec)–Extended Packet Numbering

Full title: IEEE Standard for Local and metropolitan area networks–Media Access Control (MAC) Security–Amendment 2: Extended Packet Numbering This amendment to IEEE Std 802.1AE–2006 (as previously amended by 802.1AEbn) added optional Cipher Suites, GCM-AES-XPN-128 and GCM-AES-XPN-256, that allow up to 264 frames to be protected with a single Secure Association Key (SAK) and so ease… read more »

802.1AEbn-2011: MAC Security (MACsec)–GCM-AES-256 Cipher Suite

Full title: IEEE Standard for Local and metropolitan area networks–Media Access Control (MAC) Security–Amendment 1: Galois Counter Mode–Advanced Encryption Standard–256 (GCM-AES-256) Cipher Suite This amendment to IEEE Std 802.1AE–2006 specified the GCM-AES-256 Cipher Suite in addition to the mandatory to implement Default Cipher Suite, GCM-AES-128. It added references to the MACsec Key Agreement Protocol (MKA)… read more »

802.1AE: MAC Security (MACsec)

Full title: IEEE Standard for Local and metropolitan area networks–Media Access Control (MAC) Security IEEE 802 Local Area Networks (LANs) are deployed in networks that support mission-critical applications and a wide variety of devices, implemented and administered by different organizations, and serving customers with different economic interests. The protocols that configure, manage, and regulate access… read more »

P802E: Recommended Practice for Privacy Considerations for IEEE 802 Technologies

This recommended practice specifies a privacy threat model for IEEE 802 technologies and provides recommendations on how to protect against privacy threats. The purpose of this recommended practice is to promote a consistent approach by IEEE 802 protocol developers to mitigate privacy threats identified in the specified privacy threat model and provide a privacy guideline…. read more »

Sidebar