Abstract:
Port-based network access control allows a network administrator to restrict the use of IEEE 802(R) LAN service access points (ports) to secure communication between auth...Show MoreScope:For the purpose of providing compatible authentication, authorization, and cryptographic key agreement mechanisms to support secure communication between devices connecte...Show More
Purpose:IEEE 802 LANs are deployed in networks that convey or provide access to critical data, that support mission critical applications, or that charge for service. Protocols t...Show More
Metadata
Abstract:
Port-based network access control allows a network administrator to restrict the use of IEEE 802(R) LAN service access points (ports) to secure communication between authenticated and authorized devices. This standard specifies a common architecture, functional elements, and protocols that support mutual authentication between the clients of ports attached to the same LAN and that secure communication between the ports, including the media access method independent protocols that are used to discover and establish the security associations used by IEEE 802.1AE(TM) MAC Security.
Scope:
For the purpose of providing compatible authentication, authorization, and cryptographic key agreement mechanisms to support secure communication between devices connected by IEEE 802(R) Local Area Networks (LANs), this standard a) Specifies a general method for provision of port-based network access control. b) Specifies protocols that establish secure associations for IEEE Std 802.1AE(TM) MAC Security. c) Facilitates the use of industry standard authentication and authorization protocols.
Purpose:
IEEE 802 LANs are deployed in networks that convey or provide access to critical data, that support mission critical applications, or that charge for service. Protocols that configure, manage, and regulate access to these networks and network-based services and applications typically run over the networks themselves. Port-based network access control regulates access to the network, guarding against transmission and reception by unidentified or unauthorized parties, and consequent network disruption, theft of service, or data loss.
Date of Publication: 28 February 2020
Electronic ISBN:978-1-5044-6440-6
ICS Code: 35.110 - Networking
Persistent Link: https://ieeexplore.ieee.org/servlet/opac?punumber=9018452
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Access Control ,
- Access Network ,
- Local Area Network ,
- IEEE Standard ,
- Metropolitan Area Network ,
- Network Access Control ,
- Access Points ,
- Secure Communication ,
- Medium Access Control ,
- Mutual Authentication ,
- Network Administrators ,
- Health-related Quality Of Life ,
- Random Generation ,
- Use Of Control ,
- Open Model ,
- State Machine ,
- Version Of Protocol ,
- Higher Layers ,
- Secret Key ,
- Network Management ,
- Identical Network ,
- Key Agreement ,
- Authentication Protocol ,
- Authenticity Of Results ,
- Principal Actors ,
- Security Protocols ,
- Authentication Service ,
- Caching ,
- Most Significant Bit ,
- Access Port
- Author Keywords
- access control ,
- authentication ,
- authorization ,
- controlled port ,
- EAP ,
- EAPOL ,
- IEEE 802.1X ,
- key agreement ,
- LANs ,
- local area networks ,
- MACsec ,
- MACsec Key Agreeement ,
- MAC security ,
- MAC Service ,
- MANs ,
- metropolitan area networks ,
- MKA ,
- port-based network access control ,
- secure association ,
- security ,
- service access point ,
- uncontrolled port
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Access Control ,
- Access Network ,
- Local Area Network ,
- IEEE Standard ,
- Metropolitan Area Network ,
- Network Access Control ,
- Access Points ,
- Secure Communication ,
- Medium Access Control ,
- Mutual Authentication ,
- Network Administrators ,
- Health-related Quality Of Life ,
- Random Generation ,
- Use Of Control ,
- Open Model ,
- State Machine ,
- Version Of Protocol ,
- Higher Layers ,
- Secret Key ,
- Network Management ,
- Identical Network ,
- Key Agreement ,
- Authentication Protocol ,
- Authenticity Of Results ,
- Principal Actors ,
- Security Protocols ,
- Authentication Service ,
- Caching ,
- Most Significant Bit ,
- Access Port
- Author Keywords
- access control ,
- authentication ,
- authorization ,
- controlled port ,
- EAP ,
- EAPOL ,
- IEEE 802.1X ,
- key agreement ,
- LANs ,
- local area networks ,
- MACsec ,
- MACsec Key Agreeement ,
- MAC security ,
- MAC Service ,
- MANs ,
- metropolitan area networks ,
- MKA ,
- port-based network access control ,
- secure association ,
- security ,
- service access point ,
- uncontrolled port