The scope of this standard is to specify provision of connectionless user data confidentiality, frame data integrity, and data origin authenticity by media access independent protocols and entities that operate transparently to MAC Clients. NOTE--The MAC Clients are as specified in IEEE Std 802, IEEE Std 802.2(TM), IEEE Std 802.1D(TM), IEEE Std 802.1Q(TM), and IEEE Std 802.1X(TM). To this end it a) Specifies the requirements to be satisfied by equipment claiming conformance to this standard. b)… read more Specifies the requirements for MAC Security in terms of provision of the MAC Service and the preservation of the semantics and parameters of service requests and indications. c) Describes the threats, both intentional and accidental, to correct provision of the service. d) Specifies security services that prevent, or restrict, the effect of attacks that exploit these threats. e) Examines the potential impact of both the threats and the use of MAC Security on the Quality of Service (QoS), specifying constraints on the design and operation of MAC Security entities and protocols. f) Models support of the secure MAC Service in terms of the operation of media access control method independent MAC Security Entities (SecYs) within the MAC Sublayer. g) Specifies the format of the MACsec Protocol Data Unit (MPDUs) used to provide secure service. h) Identifies the functions to be performed by each SecY, and provides an architectural model of its internal operation in terms of Processes and Entities that provide those functions. i) Specifies the interface/exchanges between a SecY and its associated and collocated MAC Security Key Agreement Entity (KaY, IEEE P802.1af [B2]) that provides and updates cryptographic keys. j) Specifies performance requirements and recommends default values and applicable ranges for the operational parameters of a SecY. k) Specifies how SecYs are incorporated within the architectural structure within end stations and bridges. l) Establishes the requirements for management of MAC Security, identifying the managed objects and defining the management operations for SecYs. m) Specifies the Management Information Base (MIB) module for managing the operation of MAC Security in TCP/IP networks. n) Specifies requirements, criteria and choices of Cipher Suites for use with this standard. This standard does not o) Specify how the relationships between MACsec protocol peers are discovered and authenticated, as supported by key management or key distribution protocols, but makes use of IEEE P802.1af Key Agreement for MAC security to achieve these functions. read less
ISO/IEC 8802 local area networks (LANs) of all types can be connected together using MAC bridges. Each individual LAN has its own independent MAC. The bridged LAN created allows the interconnection of stations as if they were attached to a single LAN, although they are in fact attached to separate LANs each with its own MAC. A MAC bridge operates below the MAC service boundary, and is largely transparent to protocols operating above this boundary, in the Logical Link Control (LLC) sublayer or… read more Network layer. The presence of one or more MAC bridges can lead to differences in the quality of service provided by the MAC sublayer; it is only because of such differences that MAC bridge operation is not fully transparent. read less
The scope of this standard is to define a protocol and management elements, suitable for advertising information to stations attached to the same IEEE 802 LAN, for the purpose of populating physical topology and device discovery management information databases. The protocol facilitates the identification of stations connected by IEEE 802 LANs/MANs, their points of interconnection, and access points for management protocols. This standard defines a protocol that: a) Advertises connectivity and… read more management information about the local station to adjacent stations on the same IEEE 802 LAN. b) Receives network management information from adjacent stations on the same IEEE 802 LAN. c) Operates with all IEEE 802 access protocols and network media. d) Establishes a network management information schema and object definitions that are suitable for storing connection information about adjacent stations. e) Provides compatibility with the IETF PTOPO MIB (IETF RFC 2922 [B14]) read less
The scope of this standard is to define the Media Access Control (MAC) Service provided by all IEEE 802(R) MACs, and the Internal Sublayer Service (ISS) provided within MAC Bridges, in abstract terms of the following: a) Their semantics, primitive actions, and events; and b) The parameters of, interrelationship between, and valid sequences of these actions and events.
This standard defines security key management extensions to address session key generation (both 128-bit and 256-bit key lengths), the creation and/or transport of broadcast/multicast keys, and security algorithm agility. This standard maintains backwards compatibility with IEEE Std 802.15.9-2016.