Committed to connecting the world

  •  
wtisd

ITU-T work programme

Home : ITU-T Home : ITU-T Work Programme : G.9961 (2018) Amd.2     
  ITU-T A.5 justification information for referenced document IEEE 802.1X-2010 in draft G.9961 (2018) Amd.2
1. Clear description of the referenced document:
Name: IEEE 802.1X-2010
Title: IEEE Standard for Local and metropolitan area networks-Port-Based Network Access Control. Port-based network access control allows a network administrator to restrict the use of IEEE802 LAN service access points (ports) to secure communication between authenticated and authorized devices. It specifies a common architecture, functional elements, and protocols that support mutual authentication between the clients of ports attached to the same LAN and that secure communication between the ports, including the media access method independent protocols that are used to discover and establish the security associations used by IEEE 802.1AE MAC Security.
2. Status of approval:
Approved as standard.
3. Justification for the specific reference:
G.9961 includes the hooks to authenticate G.hn interfaces making use of the mechanisms described in IEEE 802.1X.
4. Current information, if any, about IPR issues:
No known issues.
5. Other useful information describing the "Quality" of the document:
Standard of long standing and widespread use.
6. The degree of stability or maturity of the document:
Standard of long standing and widespread use.
7. Relationship with other existing or emerging documents:
8. Any explicit references within that referenced document should also be listed:
[1] IEEE Std 802.1D, IEEE Standard for Local and Metropolitan Area Networks: Media access control (MAC) Bridges./
[2] IEEE Std 802.1Q, IEEE Standard for Local and Metropolitan Area Networks: Virtual Bridged Local Area Networks./
[3] IEEE Std 802.1AB, IEEE Standard for Local and Metropolitan Area Networks: Station and Media Access Control Connectivity and Discovery./
[4] IEEE Std 802.1ad-2005, IEEE Standard for Local and Metropolitan Area Networks: Virtual Bridged Local Area Networks—Amendment 4: Provider Bridges./
[5] IEEE Std 802.1AE-2006, IEEE Standard for Local and Metropolitan Area Networks: Media Access Control (MAC) Security./
[6] IEEE Std 802.1AX, IEEE Standard for Local and Metropolitan Area Networks: Link Aggregation./
[7] IEEE Std 802.2, 1998 Edition [ISO/IEC 8802-2: 1998], Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Specific requirements—Part 2: Logical link control.4/
[8] IEEE Std 802.3, IEEE Standard for Information technology—Local and metropolitan area/
networks—Part 3: Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications./
[9] IEEE Std 802.11, IEEE Standard for Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Specific requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications./
[10] IEEE Std 802.17-2004 IEEE Standard for Information Technology—Telecommunications and/
information exchange between systems—Local and metropolitan area networks—Specific requirements—Part 17: Resilient packet ring (RPR) access method and physical layer specifications./
[11] IEEE Std 802.1AR, IEEE Standard for Local and Metropolitan Area Networks: Secure Device Identifier./
[12] IETF RFC 2578, STD 58, Structure of Management Information for Version 2 of the Simple Network Management Protocol (SNMPv2), McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J., Rose, M., Waldbusser, S., April 1999.5/
[13] IETF RFC 2579, STD 58, Textual Conventions for Version 2 of the Simple Network Management Protocol (SNMPv2), McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J., Rose, M., Waldbusser, S., April 1999./
[14] IETF RFC 2580, STD 58, Conformance Statements for SMIv2, McCloghrie, K., Perkins, D.,/
Schoenwaelder, J., Case, J., Rose, M., Waldbusser, S., April 1999./
[15] IETF RFC 2863, The Interfaces Group MIB using SMIv2, McCloghrie, K. and Kastenholz, F., June 2000./
[16] IETF RFC 2869, RADIUS Extensions, Rigney, C., Willats, W., and Calhoun, P., June 2000./
[17] IETF RFC 3394, Advanced Encryption Standard (AES) Key Wrap Algorithm, J. Schaad, R. Housley, September 2002./
[18] IETF RFC 3410, Introduction and Applicability Statements for Internet Standard Management Framework, J. Case, R. Mundy, D. Partain, B. Stewart, December 2002./
[19] IETF RFC 3579, RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP), Aboba, B., Calhoun, P., September 2003./
[20] IETF RFC 3580, IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Guidelines, Congdon, P., Aboba, B., Smith, A., Zorn, G., Roese, J., September 2003./
[21] IETF RFC 3629, STD 63, UTF-8, a transformation format of ISO 10646, Yergeau, F., November 2003./
[22] IETF RFC 4017, Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs, Stanley, D., Walker, J., Aboba, B., March 2005./
[23] IETF RFC 4346, The Transport Layer Security (TLS) Protocol Version 1.1, Diercks, T., Rescorla, E., April 2006./
[24] IETF RFC 4675, RADIUS Attributes for Virtual LAN and Priority Support, Congdon, P., Sanchez, M., Aboba, B., September 2006./
[25] IETF RFC 5216, The EAP-TLS Authentication Protocol, Simon, D., Aboba, B., Hurst, R., March 2008./
[26] IETF RFC 5247, Extensible Authentication Protocol (EAP) Key Management Framework, Aboba, B., Simon, D., Eronen, P., October 2007./
[27] FIPS Publication 197, The Advanced Encryption Standard (AES), U.S. DoC/NIST, November 26, 2001./
[28] NIST Federal Information Processing Standard 140-2, Security Requirements for Cryptographic Modules6, 3 December 2002.NIST Special Publication 800-38B, Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication, Morris Dworkin, May 2005.7/
[29] NIST Special Publication 800-90, Recommendation for Random Number Generation Using Deterministic Random Bit Generators, E. Barker, J. Kelsey, revised March 2007./
[30] NIST Special Publication 800-108, Recommendation for Key Derivation Using Pseudorandom Functions, Lily Chen, November 2008.
9. Qualification of IEEE:
The IEEE was recognized under the provisions of ITU-T Recommendation A.5 on 1 November 1999. Qualifying information is on file with TSB.
10. Other (for any supplementary information):
None
Note: This form is based on Recommendation ITU-T A.5