IEEE Std 802.1AE-2018 pdf free download – IEEE Standard for Local and metropolitan area networks— Media Access Control (MAC) Security.
5. Conformance
A claim of conformance to this standard is a claim that the behavior of an implementation of a MAC Security Entity (SecY) meets the requirements of this standard as they apply to the operation of the MACsec protocol, management of its operation, and provision of service to the protocol clients of the SecY, as revealed through externally observable behavior of the system of which the SecY forms a part.
A claim of conformance may be a claim of full conformance, or a claim of conformance with Cipher Suite variance, as specified in 5.4. Conformance to this standard does not ensure that the system of which the MAC Security implementation forms a part is secure, or that the operation of other protocols used to support MAC Security, such as key management and network management do not provide a way for an attacker to breach that security. Conformance to this standard does not require any restriction as to the nature of the system of which a SecY forms part other than as constrained by the SecY’s required and optional capabilities (5.3, 5.4).
Clause 11 describes the use of SecYs within a number of different types of systems. These include, but are not limited to, systems specified in IEEE Std 802.1Q and those that make use of IEEE Std 802.1X. Successful interoperable use of MACsec in those systems also requires conformance to those standards. In addition Clause 15 of this standard makes use of components specified in IEEE Std 802.1Q to define further systems, Ethernet Data Encryption devices (EDEs), whose purpose is to secure the MAC Service within networks comprising bridging systems specified by IEEE Std 802.1Q in a way that is transparent to the operation of those bridging systems. Additional claims of conformance can be made to this standard in respect of EDEs (5.5–5.7).
5.1 Requirements terminology For consistency with existing IEEE and IEEE 802.1 standards, requirements placed upon conformant implementations of this standard are expressed using the following terminology:
a) shall is used for mandatory requirements.
b) may is used to describe implementation or administrative choices (“may” means “is permitted to”, and hence, “may” and “may not” mean precisely the same thing).
c) should is used for recommended choices (the behaviors described by “should” and “should not” are both permissible but not equally desirable choices). The PICS proforma (see Annex A) reflects the occurrences of the words shall, may, and should within the standard.
The standard avoids needless repetition and apparent duplication of its formal requirements by using is, is not, are, and are not for definitions and the logical consequences of conformant behavior. Behavior that is permitted but is neither always required nor directly controlled by an implementor or administrator, or whose conformance requirement is detailed elsewhere, is described by can. Behavior that never occurs in a conformant implementation or system of conformant implementations is described by cannot.
5.2 Protocol Implementation Conformance Statement (PICS) The supplier of a MAC Security Entity (SecY) implementation that is claimed to conform to this standard shall complete a copy of the PICS proforma provided in Annex A and shall provide the information necessary to identify both the supplier and the implementation.IEEE Std 802.1AE pdf download.
IEEE Std 802.1AE-2018 pdf free download – IEEE Standard for Local and metropolitan area networks— Media Access Control (MAC) Security
Note:
If you can share this website on your Facebook,Twitter or others,I will share more.