{"id":136546,"date":"2024-10-19T07:52:43","date_gmt":"2024-10-19T07:52:43","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-802-1xbx-2014\/"},"modified":"2024-10-25T00:02:39","modified_gmt":"2024-10-25T00:02:39","slug":"ieee-802-1xbx-2014","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-802-1xbx-2014\/","title":{"rendered":"IEEE 802.1Xbx 2014"},"content":{"rendered":"

Amendment Standard – Active. Media Access Control security (MACsec) Key Agreement protocol (MKA) data elements and procedures that provide additional security and manageability capabilities, including the ability to maintain secure communication while the operation of MKA is suspended, when used in conjunction with MACsec Cipher Suites that support Extended Packet Numbering are added in this amendment.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nIEEE Std 802.1Xbx-2014 Front Cover <\/td>\n<\/tr>\n
3<\/td>\nTitle page <\/td>\n<\/tr>\n
5<\/td>\nImportant Notices and Disclaimers Concerning IEEE Standards Documents <\/td>\n<\/tr>\n
8<\/td>\nParticipants <\/td>\n<\/tr>\n
10<\/td>\nIntroduction <\/td>\n<\/tr>\n
11<\/td>\nContents <\/td>\n<\/tr>\n
13<\/td>\nList of figures <\/td>\n<\/tr>\n
14<\/td>\nList of tables <\/td>\n<\/tr>\n
15<\/td>\nIMPORTANT NOTICE <\/td>\n<\/tr>\n
16<\/td>\n2. Normative references <\/td>\n<\/tr>\n
19<\/td>\n3. Definitions <\/td>\n<\/tr>\n
20<\/td>\n4. Abbreviations and acronyms <\/td>\n<\/tr>\n
21<\/td>\n5. Conformance
5.11 MKA options
5.11.4 In-service upgrades <\/td>\n<\/tr>\n
22<\/td>\n6. Principles of port-based network access control operation
6.2 Key hierarchy
6.2.4 Algorithm agility <\/td>\n<\/tr>\n
23<\/td>\n7. Port-based network access control applications
7.7.2 System configuration and operation <\/td>\n<\/tr>\n
24<\/td>\n9. MACsec Key Agreement protocol (MKA)
9.1 Protocol design requirements <\/td>\n<\/tr>\n
25<\/td>\n9.3.3 Derived keys <\/td>\n<\/tr>\n
27<\/td>\n9.4.3 Determining liveness
9.4.6 Active and passive participants <\/td>\n<\/tr>\n
28<\/td>\n9.5 Key server election <\/td>\n<\/tr>\n
29<\/td>\n9.6.1 MKPDU application data
9.7.1 MKPDU application data <\/td>\n<\/tr>\n
30<\/td>\n9.8 SAK generation, distribution, and selection
9.10.1 MKPDU application data <\/td>\n<\/tr>\n
31<\/td>\n9.15 MKA participant timer values
9.16 MKA management <\/td>\n<\/tr>\n
32<\/td>\n9.18 In-service upgrades
9.18.1 Initiating suspension <\/td>\n<\/tr>\n
33<\/td>\n9.18.2 Suspending
9.18.3 Suspended members <\/td>\n<\/tr>\n
34<\/td>\n9.18.4 Resuming operation <\/td>\n<\/tr>\n
35<\/td>\n9.18.5 XPN support
9.18.6 Managing in-service upgrades <\/td>\n<\/tr>\n
36<\/td>\n9.18.7 MKPDU application data
9.19 In-service upgrade examples <\/td>\n<\/tr>\n
37<\/td>\n9.19.1 Requested by end station in point-to-point CA
9.19.2 Initiated by Key Server in point-to-point CA <\/td>\n<\/tr>\n
38<\/td>\n9.19.3 Intermediate systems suspending multiple CAs <\/td>\n<\/tr>\n
39<\/td>\n9.19.4 Key Server suspends in a group CA <\/td>\n<\/tr>\n
40<\/td>\n11. EAPOL PDUs
11.5 EAPOL protocol version handling
11.11 EAPOL-MKA <\/td>\n<\/tr>\n
41<\/td>\n11.11.1 MKA parameter encoding <\/td>\n<\/tr>\n
44<\/td>\n11.12.3 MACsec Cipher Suites TLV <\/td>\n<\/tr>\n
46<\/td>\n12. PAE operation
12.1 Model of operation
12.2 KaY interfaces <\/td>\n<\/tr>\n
47<\/td>\n12.5 Logon Process
12.5.1 Controlling connectivity
12.5.2 Active and passive participation <\/td>\n<\/tr>\n
48<\/td>\n12.5.3 Network Identities
12.9 PAE management
12.9.2 Identifying PAEs and their capabilities <\/td>\n<\/tr>\n
50<\/td>\n13. PAE MIB
13.4 Security considerations
13.5 Definitions for PAE MIB <\/td>\n<\/tr>\n
99<\/td>\nAnnex A (normative) PICS Proforma
A.9 MKA requirements and options <\/td>\n<\/tr>\n
100<\/td>\nAnnex B (informative) Bibliography <\/td>\n<\/tr>\n
102<\/td>\nAnnex H (informative) Test vectors
H.1 KDF <\/td>\n<\/tr>\n
103<\/td>\nH.2 CAK Key Derivation
H.3 CKN Derivation <\/td>\n<\/tr>\n
104<\/td>\nH.4 KEK Derivation
H.5 ICK Derivation <\/td>\n<\/tr>\n
105<\/td>\nH.6 SAK Derivation <\/td>\n<\/tr>\n
107<\/td>\nBack Cover <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

IEEE Standard for Local and metropolitan area networks — Port-Based Network Access Control Amendment 1: MAC Security Key Agreement Protocol (MKA) Extensions<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2014<\/td>\n107<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":136548,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-136546","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/136546","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/136548"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=136546"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=136546"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=136546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}