{"id":398276,"date":"2024-10-20T04:34:57","date_gmt":"2024-10-20T04:34:57","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-802-1aecg-2017-2\/"},"modified":"2024-10-26T08:23:14","modified_gmt":"2024-10-26T08:23:14","slug":"ieee-802-1aecg-2017-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-802-1aecg-2017-2\/","title":{"rendered":"IEEE 802.1AEcg-2017"},"content":{"rendered":"
Amendment Standard – Superseded. Ethernet Data Encryption devices (EDEs) are specified in this amendment. An EDE is a two-port bridge that uses MACsec to provide secure connectivity for attached customer bridges, or for attached provider bridges. EDEs may allow the customer (or provider) bridges to continue to use a VLAN Identifier (VID) in transmitted frames to select<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | IEEE Std 802.1AEcg-2017 Front cover <\/td>\n<\/tr>\n | ||||||
2<\/td>\n | Title page <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | Important Notices and Disclaimers Concerning IEEE Standards Documents <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Participants <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | Figures <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | Tables <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 1. Overview 1.2 Scope <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 2. Normative references <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 3. Definitions <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 4. Abbreviations and acronyms <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 5. Conformance 5.1 Requirements terminology <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 5.2 Protocol Implementation Conformance Statement (PICS) 5.3 Required capabilitiesMAC Security Entity requirements <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 5.4 Optional capabilitiesMAC Security Entity options <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 5.5 EDE conformance 5.6 EDE-M conformance <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 5.7 EDE-CS conformance 5.8 EDE-CC conformance 5.9 EDE-SS conformance <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 6. Secure provision of the MAC Service 6.1 MAC Service primitives and parameters 6.2 MAC Service connectivity <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 6.4 MAC status parameters 6.5 MAC point-to-point parameters 6.10 Quality of service maintenance <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 7. Principles of secure network operation 7.1 Support of the secure MAC Service by an individual LAN 7.1.2 Secure Channel (SC) 7.1.3 Secure Association (SA) Untitled <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | Figure 7-7\u2014Secure Channel and Secure Association Identifiers 7.3 Use of the secure MAC Service 7.3.1 Client policies <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 7.3.2 Use of the secure MAC Service by bridges <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 8. MAC Security Protocol (MACsec) 8.1.1 Security requirements 8.2.1 SC identification requirements 8.2.5 Authentication requirements 8.2.6 Authorization requirements 8.3 MACsec operation <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 9. Encoding of MACsec protocol data units 9.9 Secure Channel Identifier (SCI) <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 10. Principles of MAC Security Entity (SecY) operation 10.1 SecY overview 10.2 SecY functions <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 10.4 SecY architecture Figure 10-4\u2014Management controls and counters for secure frame generation 10.5 Secure frame generation <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 10.5.1 Transmit SA assignment <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | Figure 10-5\u2014Management controls and counters for secure frame verification <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 10.5.3 SecTAG encoding <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 10.6 Secure frame verification 10.6.1 Receive SA assignment <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 10.7 SecY management <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | Figure 10-6\u2014SecY managed objects <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 10.7.1 SCI 10.7.4 Controlled Port status 10.7.6 Controlled Port statistics <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 10.7.8 Frame verification controls 10.7.9 Frame verification statistics <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 10.7.14 Receive SA status 10.7.16 Frame generation capabilities 10.7.17 Frame generation controls <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 10.7.18 Frame generation statistics 10.7.20 Transmit SC creation <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 10.7.21 Transmit SC status 10.7.22 Transmit SA creation 10.7.23 Transmit SA status <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 10.7.25 Implemented Cipher Suites <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 10.7.26 SecY Cipher Suite use 10.7.28 SAK creation <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 11. MAC Security in Systems 11.1 MAC Service interface stacks 11.3 MACsec in MAC Bridges Figure 11-4 MACsec in a VLAN-unaware MAC Bridge <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | Figure 11-5 VLAN-unaware MAC Bridge Port with MACsec 11.4 MACsec in VLAN-aware Bridges Figure 11-6\u2014Addition of MAC Security to a VLAN-aware MAC Bridge 11.8 MACsec and multi-access LANs <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | Figure 11-15\u2014An example multi-access LAN <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | 13. Management protocol MAC Security Entity MIB 13.1 Introduction 13.4 Security considerations <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 13.5 Structure of the MIB module <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 13.6 Definitions for MAC Security Entity (SecY) MIB definitions <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | 14. Encoding of MACsec protocol data units 14.5 Default Cipher Suite (GCM\u2013AES\u2013128) 14.6 GCM-AES-256 <\/td>\n<\/tr>\n | ||||||
102<\/td>\n | 15. Ethernet Data Encryption devices 15.1 EDE characteristics <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | 15.2 Securing LANs with EDE-Ms Figure 15-1\u2014EDE-Ms connected by a point-to-point LAN <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | Figure 15-2\u2014EDE-Ms securing a point-to-point LAN between Provider Bridges <\/td>\n<\/tr>\n | ||||||
105<\/td>\n | 15.3 Securing connectivity across PBNs Figure 15-3\u2014MACsec protected frame traversing a PBN <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | 15.4 Securing PBN connectivity with an EDE-M Figure 15-4\u2014EDE-Ms securing point-to-point LAN connectivity across a PBN <\/td>\n<\/tr>\n | ||||||
107<\/td>\n | Figure 15-5\u2014EDE-Ms securing multi-point PBN connectivity 15.5 Securing PBN connectivity with an EDE-CS <\/td>\n<\/tr>\n | ||||||
108<\/td>\n | Figure 15-6\u2014Example of a network with an EDE-CS <\/td>\n<\/tr>\n | ||||||
109<\/td>\n | Figure 15-7\u2014EDE-CS connected to a PBN S-tagged interface 15.6 Securing PBN connectivity with an EDE-CC <\/td>\n<\/tr>\n | ||||||
111<\/td>\n | Figure 15-9\u2014EDE-CC architecture <\/td>\n<\/tr>\n | ||||||
112<\/td>\n | 15.7 Securing PBN connectivity with an EDE-SS 15.8 EDE Interoperability <\/td>\n<\/tr>\n | ||||||
113<\/td>\n | 15.9 EDEs, CFM, and UNI Access <\/td>\n<\/tr>\n | ||||||
115<\/td>\n | 16. Using MIB modules to manage EDEs 16.1 Security considerations 16.2 EDE-M Management 16.3 EDE-CS Management 16.4 EDE-CC and EDE-SS Management <\/td>\n<\/tr>\n | ||||||
117<\/td>\n | Annex A (normative) PICS Proforma A.5 Major capabilities <\/td>\n<\/tr>\n | ||||||
119<\/td>\n | A.9 Secure Frame Verification <\/td>\n<\/tr>\n | ||||||
123<\/td>\n | A.12 Additional fully conformant Cipher Suite capabilities <\/td>\n<\/tr>\n | ||||||
124<\/td>\n | A.13 Additional variant Cipher Suite capabilities <\/td>\n<\/tr>\n | ||||||
126<\/td>\n | Annex B (informative) Bibliography <\/td>\n<\/tr>\n | ||||||
128<\/td>\n | Annex D (normative) PICS Proforma for an Ethernet Data Encryption device D.1 Introduction D.2 Abbreviations and special symbols D.2.1 Status symbols D.2.2 General abbreviations <\/td>\n<\/tr>\n | ||||||
129<\/td>\n | D.3 Instructions for completing the PICS proforma D.3.1 General structure of the PICS proforma D.3.2 Additional information D.3.3 Exception information <\/td>\n<\/tr>\n | ||||||
130<\/td>\n | D.3.4 Conditional status D.3.4.1 Conditional items D.3.4.2 Predicates <\/td>\n<\/tr>\n | ||||||
131<\/td>\n | D.4 PICS proforma for IEEE Std 802.1AE EDE D.4.1 Implementation identification D.4.2 Protocol summary, IEEE Std 802.1AE EDE <\/td>\n<\/tr>\n | ||||||
132<\/td>\n | D.5 EDE type and common requirements <\/td>\n<\/tr>\n | ||||||
133<\/td>\n | D.6 EDE-M Configuration D.7 EDE-CS Configuration <\/td>\n<\/tr>\n | ||||||
134<\/td>\n | D.8 EDE-CC Configuration D.9 EDE-SS Configuration <\/td>\n<\/tr>\n | ||||||
135<\/td>\n | Annex E (informative) MKA operation for multiple transmit SCs <\/td>\n<\/tr>\n | ||||||
137<\/td>\n | Annex F (informative) EDE Interoperability and PAE addresses <\/td>\n<\/tr>\n | ||||||
140<\/td>\n | Annex G (informative) Management and MIB revisions <\/td>\n<\/tr>\n | ||||||
141<\/td>\n | G.1 Counter changes <\/td>\n<\/tr>\n | ||||||
142<\/td>\n | G.2 Available Cipher Suites <\/td>\n<\/tr>\n | ||||||
143<\/td>\n | Back cover <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" IEEE Standard for Local and metropolitan area networks–Media Access Control (MAC) Security – Amendment 3: Ethernet Data Encryption devices<\/b><\/p>\n |