{"id":395874,"date":"2024-10-20T04:21:46","date_gmt":"2024-10-20T04:21:46","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-802-1x-2001-2\/"},"modified":"2024-10-26T08:08:12","modified_gmt":"2024-10-26T08:08:12","slug":"ieee-802-1x-2001-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-802-1x-2001-2\/","title":{"rendered":"IEEE 802.1X-2001"},"content":{"rendered":"
New IEEE Standard – Superseded. This IEEE Standards product is part of the 802 family on LAN\/MAN. Port-based network access control makes use of the physical access characteristics of IEEE 802 Local Area Networks (LAN) infrastructures in order to provide a means of authenticating and authorizing devices attached to a LAN port that has point-to-point connection characteristics, and of preventing access to that port in cases in which the authentication and authorization process fails.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | Title Page <\/td>\n<\/tr>\n | ||||||
3<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
5<\/td>\n | Participants <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | CONTENTS <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1. Overview 1.1 Scope 1.2 Purpose <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 2. References <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 3. Definitions 3.1 Definitions 4. Acronyms and abbreviations 5. Conformance 5.1 Static conformance requirements <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.2 Options <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 6. Principles of operation 6.1 Systems, Ports, and system roles <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 6.2 Port access entity 6.3 Controlled and uncontrolled access <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 6.4 Unidirectional and bidirectional control <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.5 Use of Port Access Control with IEEE Std 802.3, 2000 Edition 7. EAP encapsulation over LANs (EAPOL) 7.1 Transmission and representation of octets <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 7.2 EAPOL frame format for 802.3\/Ethernet 7.3 EAPOL frame format for Token Ring\/FDDI 7.4 Tagging EAPOL frames <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 7.5 EAPOL PDU field and parameter definitions <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 7.6 Key Descriptor format <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 7.7 EAP packet format\u2014informative <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 7.8 EAPOL addressing <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 7.9 Use of EAPOL in shared media LANs 8. Port Access Control 8.1 Purpose 8.2 Scope <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 8.3 Overview of Port Access Entity operation <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 8.4 Protocol operation <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 8.5 EAPOL state machines <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | 9. Management of Port Access Control 9.1 Management functions <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | 9.2 Managed objects <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | 9.3 Data types 9.4 Authenticator PAE managed objects <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | 9.5 Supplicant PAE managed objects <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | 9.6 System managed objects <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | 10. Management protocol 10.1 Introduction 10.2 The SNMP Management Framework <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | 10.3 Security considerations 10.4 Structure of the MIB <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | 10.5 Relationship to other MIBs <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | 10.6 Definitions for Port Access Control MIB <\/td>\n<\/tr>\n | ||||||
115<\/td>\n | Annex A: PICS Proforma <\/td>\n<\/tr>\n | ||||||
122<\/td>\n | Annex B: Scenarios for the use of Port-Based Network Access Control <\/td>\n<\/tr>\n | ||||||
126<\/td>\n | Annex C: Design considerations and background material for Port-Based Network Access Control <\/td>\n<\/tr>\n | ||||||
133<\/td>\n | Annex D: IEEE 802.1X RADIUS Usage Guidelines <\/td>\n<\/tr>\n | ||||||
142<\/td>\n | Annex E: Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" IEEE Standard for Port Based Network Access Control<\/b><\/p>\n |