Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Part 1AE: Media access control (MAC) security — Amendment 2: Extended Packet Numbering

Technologies de l'information — Télécommunications et échange d'information entre systèmes — Réseaux locaux et métropolitains — Partie 1AE: Sécurité du contrôle d'accès aux supports (MAC) — Amendement 2: .

General Information

Status
Withdrawn
Publication Date
27-Apr-2015
Withdrawal Date
27-Apr-2015
Current Stage
9599 - Withdrawal of International Standard
Start Date
21-Aug-2020
Completion Date
21-Aug-2020
Ref Project

RELATIONS

Buy Standard

Standard
ISO/IEC/IEEE 8802-1AE:2013/Amd 2:2015 - Extended Packet Numbering
English language
53 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (sample)

INTERNATIONAL ISO/IEC/
STANDARD IEEE
8802-1AE
First edition
2013-12-01
AMENDMENT 2
2015-05-01
Information technology —
Telecommunications and information
exchange between systems — Local and
metropolitan area networks —
Part 1AE:
Media access control (MAC) security
AMENDMENT 2: Extended Packet
Numbering
Technologies de l'information — Télécommunications et échange
d'information entre systèmes — Réseaux locaux et métropolitains —
Partie 1AE: Sécurité du contrôle d'accès aux supports (MAC)
AMENDEMENT 2
Reference number
ISO/IEC/IEEE 8802-1AE:2013/Amd.2:2015(E)
IEEE 2015
---------------------- Page: 1 ----------------------
ISO/IEC/IEEE 8802-1AE:2013/Amd.2:2015(E)
COPYRIGHT PROTECTED DOCUMENT
© IEEE 2015

All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means,

electronic or mechanical, including photocopying and microfilm, without permission in writing from ISO, IEC or IEEE at the respective

address below.

ISO copyright office IEC Central Office Institute of Electrical and Electronics Engineers, Inc.

Case postale 56 3, rue de Varembé 3 Park Avenue, New York
CH-1211 Geneva 20 CH-1211 Geneva 20 NY 10016-5997, USA
Tel. + 41 22 749 01 11 Switzerland E-mail stds.ipr@ieee.org
Fax + 41 22 749 09 47 E-mail inmail@iec.ch Web www.ieee.org
E-mail copyright@iso.org Web www.iec.ch
Web www.iso.org
Published in Switzerland
ii © IEEE 2015 – All rights reserved
---------------------- Page: 2 ----------------------
ISO/IEC/IEEE 8802-1AE:2013/Amd.2:2015(E)
Foreword

ISO (the International Organization for Standardization) and IEC (the International Electrotechnical

Commission) form the specialized system for worldwide standardization. National bodies that are members of

ISO or IEC participate in the development of International Standards through technical committees established

by the respective organization to deal with particular fields of technical activity. ISO and IEC technical

committees collaborate in fields of mutual interest. Other international organizations, governmental and non-

governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO

and IEC have established a joint technical committee, ISO/IEC JTC 1.

IEEE Standards documents are developed within the IEEE Societies and the Standards Coordinating

Committees of the IEEE Standards Association (IEEE-SA) Standards Board. The IEEE develops its standards

through a consensus development process, approved by the American National Standards Institute, which

brings together volunteers representing varied viewpoints and interests to achieve the final product. Volunteers

are not necessarily members of the Institute and serve without compensation. While the IEEE administers the

process and establishes rules to promote fairness in the consensus development process, the IEEE does not

independently evaluate, test, or verify the accuracy of any of the information contained in its standards.

The main task of ISO/IEC JTC 1 is to prepare International Standards. Draft International Standards adopted

by the joint technical committee are circulated to national bodies for voting. Publication as an International

Standard requires approval by at least 75 % of the national bodies casting a vote.

Attention is called to the possibility that implementation of this standard may require the use of subject matter

covered by patent rights. By publication of this standard, no position is taken with respect to the existence or

validity of any patent rights in connection therewith. ISO/IEEE is not responsible for identifying essential

patents or patent claims for which a license may be required, for conducting inquiries into the legal validity or

scope of patents or patent claims or determining whether any licensing terms or conditions provided in

connection with submission of a Letter of Assurance or a Patent Statement and Licensing Declaration Form, if

any, or in any licensing agreements are reasonable or non-discriminatory. Users of this standard are expressly

advised that determination of the validity of any patent rights, and the risk of infringement of such rights, is

entirely their own responsibility. Further information may be obtained from ISO or the IEEE Standards

Association.

Amendment 1 to ISO/IEC/IEEE 8802-11 was prepared by the LAN/MAN Standards Committee of the IEEE

Computer Society (as IEEE Std 802.11ae-2012). It was adopted by Joint Technical Committee

ISO/IEC JTC 1, Information technology, Subcommittee SC 6, Telecommunications and information exchange

between systems, in parallel with its approval by the ISO/IEC national bodies, under the “fast-track procedure”

defined in the Partner Standards Development Organization cooperation agreement between ISO and IEEE.

IEEE is responsible for the maintenance of this document with participation and input from ISO/IEC national

bodies.
© IEEE 2015 – All rights reserved iii
---------------------- Page: 3 ----------------------
ISO/IEC/IEEE 8802-1AE:2013/Amd.2:2015(E)
(blank page)
iv © IEEE 2015 – All rights reserved
---------------------- Page: 4 ----------------------
IEEE Standard for
Local and metropolitan area networks—
Media Access Control (MAC) Security
Amendment 2:
Extended Packet Numbering
IEEE Computer Society
Sponsored by the
LAN/MAN Standards Committee
IEEE
IEEE Std 802.1AEbw™-2013
3 Park Avenue
(Amendment to
New York, NY 10016-5997
IEEE Std 802.1AE™-2006)
USA
12 February 2013
---------------------- Page: 5 ----------------------
IEEE Std 802.1AEbw -2013
(Amendment to
IEEE Std 802.1AE -2006)
IEEE Standard for
Local and metropolitan area networks—
Media Access Control (MAC) Security
Amendment 2:
Extended Packet Numbering
Sponsor
LAN/MAN Standards Committee
of the
IEEE Computer Society
Approved 7 February 2013
IEEE-SA Standards Board
---------------------- Page: 6 ----------------------

Abstract: The optional use of Cipher Suites that make use of a 64-bit (PN) to allow more than 2

MACsec protected frames to be sent with a single Secure Association Key are specified by this

amendment.

Keywords: authorized port, confidentiality, data origin authenticity, IEEE 802.1AE, IEEE

802.1AEbw, integrity, LANs, local area networks, MAC Bridges, MAC security, MAC Service,

MANs, metropolitan area networks, port based network access control, secure association, secu-

rity, transparent bridging
The Institute of Electrical and Electronics Engineers, Inc.
3 Park Avenue, New York, NY 10016-5997, USA
Copyright © 2013 by the Institute of Electrical and Electronics Engineers, Inc.

All rights reserved. Published 12 February 2013. Printed in the United States of America.

IEEE and 802 are registered trademarks in the U.S. Patent & Trademark Office, owned by the Institute of Electrical and

Electronics Engineers, Incorporated.
PDF: ISBN 978-0-7381-8148-6 STD98100
Print: ISBN 978-0-7381-8149-3 STDPD98100

IEEE prohibits discrimination, harassment, and bullying. For more information, visit http://www.ieee.org/web/aboutus/

whatis/policies/p9-26.html.

No part of this publication may be reproduced in any form, in an electronic retrieval system or otherwise, without the prior

written permission of the publisher.
---------------------- Page: 7 ----------------------

Notice and Disclaimer of Liability Concerning the Use of IEEE Documents: IEEE Standards documents are developed

within the IEEE Societies and the Standards Coordinating Committees of the IEEE Standards Association (IEEE-SA)

Standards Board. IEEE develops its standards through a consensus development process, approved by the American National

Standards Institute, which brings together volunteers representing varied viewpoints and interests to achieve the final product.

Volunteers are not necessarily members of the Institute and serve without compensation. While IEEE administers the process

and establishes rules to promote fairness in the consensus development process, IEEE does not independently evaluate, test, or

verify the accuracy of any of the information or the soundness of any judgments contained in its standards.

Use of an IEEE Standard is wholly voluntary. IEEE disclaims liability for any personal injury, property or other damage, of any

nature whatsoever, whether special, indirect, consequential, or compensatory, directly or indirectly resulting from the

publication, use of, or reliance upon any IEEE Standard document.

IEEE does not warrant or represent the accuracy or content of the material contained in its standards, and expressly disclaims

any express or implied warranty, including any implied warranty of merchantability or fitness for a specific purpose, or that the

use of the material contained in its standards is free from patent infringement. IEEE Standards documents are supplied "AS IS."

The existence of an IEEE Standard does not imply that there are no other ways to produce, test, measure, purchase, market, or

provide other goods and services related to the scope of the IEEE standard. Furthermore, the viewpoint expressed at the time a

standard is approved and issued is subject to change brought about through developments in the state of the art and comments

received from users of the standard. Every IEEE standard is subjected to review at least every ten years. When a document is

more than ten years old and has not undergone a revision process, it is reasonable to conclude that its contents, although still of

some value, do not wholly reflect the present state of the art. Users are cautioned to check to determine that they have the latest

edition of any IEEE standard.

In publishing and making its standards available, IEEE is not suggesting or rendering professional or other services for, or on

behalf of, any person or entity. Nor is IEEE undertaking to perform any duty owed by any other person or entity to another. Any

person utilizing any IEEE Standards document, should rely upon his or her own independent judgment in the exercise of

reasonable care in any given circumstances or, as appropriate, seek the advice of a competent professional in determining the

appropriateness of a given IEEE standard.

Translations: The IEEE consensus development process involves the review of documents in English only. In the event that an

IEEE standard is translated, only the English version published by IEEE should be considered the approved IEEE standard.

Official Statements: A statement, written or oral, that is not processed in accordance with the IEEE-SA Standards Board

Operations Manual shall not be considered the official position of IEEE or any of its committees and shall not be considered to

be, nor be relied upon as, a formal position of IEEE. At lectures, symposia, seminars, or educational courses, an individual

presenting information on IEEE standards shall make it clear that his or her views should be considered the personal views of

that individual rather than the formal position of IEEE.

Comments on Standards: Comments for revision of IEEE Standards documents are welcome from any interested party,

regardless of membership affiliation with IEEE. However, IEEE does not provide consulting information or advice pertaining

to IEEE Standards documents. Suggestions for changes in documents should be in the form of a proposed change of text,

together with appropriate supporting comments. Since IEEE standards represent a consensus of concerned interests, it is

important to ensure that any responses to comments and questions also receive the concurrence of a balance of interests. For

this reason, IEEE and the members of its societies and Standards Coordinating Committees are not able to provide an instant

response to comments or questions except in those cases where the matter has previously been addressed. Any person who

would like to participate in evaluating comments or revisions to an IEEE standard is welcome to join the relevant IEEE working

group at http://standards.ieee.org/develop/wg/.
Comments on standards should be submitted to the following address:
Secretary, IEEE-SA Standards Board
445 Hoes Lane
Piscataway, NJ 08854
USA

Photocopies: Authorization to photocopy portions of any individual standard for internal or personal use is granted by The In-

stitute of Electrical and Electronics Engineers, Inc., provided that the appropriate fee is paid to Copyright Clearance Center. To

arrange for payment of licensing fee, please contact Copyright Clearance Center, Customer Service, 222 Rosewood Drive, Dan-

vers, MA 01923 USA; +1 978 750 8400. Permission to photocopy portions of any individual standard for educational classroom

use can also be obtained through the Copyright Clearance Center.
Copyright © 2013 IEEE. All rights reserved. iii
---------------------- Page: 8 ----------------------
Notice to users
Laws and regulations

Users of IEEE Standards documents should consult all applicable laws and regulations. Compliance with the

provisions of any IEEE Standards document does not imply compliance to any applicable regulatory

requirements. Implementers of the standard are responsible for observing or referring to the applicable

regulatory requirements. IEEE does not, by the publication of its standards, intend to urge action that is not

in compliance with applicable laws, and these documents may not be construed as doing so.

Copyrights

This document is copyrighted by the IEEE. It is made available for a wide variety of both public and private

uses. These include both use, by reference, in laws and regulations, and use in private self-regulation,

standardization, and the promotion of engineering practices and methods. By making this document

available for use and adoption by public authorities and private users, the IEEE does not waive any rights in

copyright to this document.
Updating of IEEE documents

Users of IEEE Standards documents should be aware that these documents may be superseded at any time

by the issuance of new editions or may be amended from time to time through the issuance of amendments,

corrigenda, or errata. An official IEEE document at any point in time consists of the current edition of the

document together with any amendments, corrigenda, or errata then in effect. In order to determine whether

a given document is the current edition and whether it has been amended through the issuance of

amendments, corrigenda, or errata, visit the IEEE-SA Website or contact the IEEE at the address listed

previously. For more information about the IEEE Standards Association or the IEEE standards development

process, visit the IEEE-SA Website.
Errata

Errata, if any, for this and all other standards can be accessed at the following URL: http://

standards.ieee.org/findstds/errata/index.html. Users are encouraged to check this URL for errata

periodically.
iv Copyright © 2013 IEEE. All rights reserved.
---------------------- Page: 9 ----------------------
Patents

Attention is called to the possibility that implementation of this standard may require use of subject matter

covered by patent rights. By publication of this standard, no position is taken by the IEEE with respect to the

existence or validity of any patent rights in connection therewith. If a patent holder or patent applicant has

filed a statement of assurance via an Accepted Letter of Assurance, then the statement is listed on the IEEE-

SA Website at http://standards.ieee.org/about/sasb/patcom/patents.html. Letters of Assurance may indicate

whether the Submitter is willing or unwilling to grant licenses under patent rights without compensation or

under reasonable rates, with reasonable terms and conditions that are demonstrably free of any unfair

discrimination to applicants desiring to obtain such licenses.

Essential Patent Claims may exist for which a Letter of Assurance has not been received. The IEEE is not

responsible for identifying Essential Patent Claims for which a license may be required, for conducting

inquiries into the legal validity or scope of Patents Claims, or determining whether any licensing terms or

conditions provided in connection with submission of a Letter of Assurance, if any, or in any licensing

agreements are reasonable or non-discriminatory. Users of this standard are expressly advised that

determination of the validity of any patent rights, and the risk of infringement of such rights, is entirely their

own responsibility. Further information may be obtained from the IEEE Standards Association.

Copyright © 2013 IEEE. All rights reserved. v
---------------------- Page: 10 ----------------------
Introduction

This introduction is not part of IEEE Std 802.1AEbw-2013, IEEE Standard for Local and metropolitan area net-

works—Media Access Control (MAC) Security—Amendment 2: Extended Packet Numbering.

The first edition of IEEE Std 802.1AE was published in 2006. A first amendment, IEEE Std

802.1AEbn -2011, added the option of using the GCM-AES-256 Cipher Suite. This second amendment

adds optional Cipher Suites, GCM-AES-XPN-128 and GCM-AES-XPN-256, that allow more than 2

frames to be protected with a single Secure Association Key (SAK) and so ease the timeliness requirements

on key agreement protocols for very high speed (100 Gb/s plus) operation.
Relationship between IEEE Std 802.1AE and other IEEE Std 802 standards

IEEE Std 802.1X -2010 specifies Port-based Network Access Control, and provides a means of

authenticating and authorizing devices attached to a LAN, and includes the MACsec Key Agreement

protocol (MKA) necessary to make use of IEEE 802.1AE.

This standard is not intended for use with IEEE Std 802.11 Wireless LAN Medium Access Control. An

TM TM

amendment to that standard, IEEE Std 802.11i -2004, also makes use of IEEE Std 802.1X , thus

facilitating the use of a common authentication and authorization framework for LAN media to which this

standard applies and for Wireless LANs.
vi Copyright © 2013 IEEE. All rights reserved.
---------------------- Page: 11 ----------------------
Participants

At the time this standard was submitted to the IEEE-SA Standard Board for approval, the IEEE P802.1

Working Group had the following membership:
Tony Jeffree, Chair
Glenn Parsons, Vice-Chair
Mick Seaman, Editor and Task Group Chair
Zehavit Alon Anoop Ghanwani John Morris
Franz Goetz Eric Multanen
Yafan An
David Olsen
Ting Ao Mark Gravel
Donald Pannell
Eric Gray
Peter Ashwood-Smith
Mark Pearson
Christian Boiger Yingjie Gu
Joseph Pelissier
Brad Booth Craig Gunther
Rene Raeber
Paul Bottorff Stephen Haddock
Karen T. Randall
Rudolf Brandner Hitoshi Hayakawa
Josef Roese
Craig Carlson Markus Jochim
Dan Romascanu
Xin Chang Michael Johas Teener
Jessy Rouyer
Weiying Cheng Girault Jones
Ali Sajassi
Paul Congdon Daya Kamath
Panagiotis Saltsidis
Diego Crupnicoff Hal Keen
Koichiro Seto
Rodney Cummings Srikanth Keesara
Rakesh Sharma
Claudio Desanti Yongbum Kim
Takeshi Shimizu
Donald Eastlake, III Philippe Klein
Kevin Stanton
Janos Farkas Oliver Kleineberg
PatriciaThaler
Donald Fedyk Jeff Lynch
Jeremy Touve
Norman Finn Ben Mack-Crane
Maarten Vissers
Andre Fredette David Martin
Yuehua Wei
Geoffrey Garner John Messenger
Min Xiao

The following members of the individual balloting committee voted on this standard. Balloters may have

voted for approval, disapproval, or abstention.
Atsushi Ito
Thomas Alexander Benjamin Rolfe
Arthur Astrin Tony Jeffree Randall Safier
Nancy Bravin Michael Johas Teener
Bartien Sayogo
William Byrd Shinkyo Kaku
Mick Seaman
Radhakrishna Canchi Piotr Karocki
Gil Shultz
Juan Carreon Stuart Kerry
Dorothy Stanley
Keith Chow Yongbum Kim
Thomas Starai
Charles Cook Bruce Kraemer
Walter Struppler
Rodney Cummings Geoff Ladwig
Joseph Tardo
Ray Davis Shen Loh
William Taylor
Sourav Dutta William Lumpkins
Patricia Thaler
Donald Fedyk Greg Luri
Solomon Trainin
Yukihiro Fujimoto Elvis Maculuba
Dmitri Varsanofiev
Devon Gayle Jonathon Mclendon
Prabodh Varshney
Eric Gray Michael S. Newman
John Vergis
Randall Groves Charles Ngethe
Hung-Yu Wei
Michael Gundlach Satoshi Obara
Brian Weis
Chris Guy Yoshihiro Ohba
Oren Yuen
Russell Housley Karen Randall
Noriyuki Ikeuchi Maximilian Riegel Daidi Zhong
Copyright © 2013 IEEE. All rights reserved. vii
---------------------- Page: 12 ----------------------

When the IEEE-SA Standards Board approved this standard on 7 February 2013, it had the following

membership:
John Kulick, Chair
Richard H. Hulett, Past Chair
Konstantinos Karachalios, Secretary
Masayuki Ariyoshi Mark Halpin Ron Peterson
Peter Balma
Gary Hoffman Gary Robinson
Farooq Bari
Paul Houzé Jon Walter Rosdahl
Ted Burse Jim Hughes Adrian Stephens
Wael William Diab Michael Janezic Peter Sutherland
Stephen Dukes Joseph L. Koepfinger* Yatin Trivedi
Jean-Philippe Faure David J. Law Phil Winston
Yu Yuan
Oleg Logvinov
Alexander Gelman
*Member Emeritus
Also included are the following nonvoting IEEE-SA Standards Board liaisons:
Richard DeBlasio, DOE Representative
Michael Janezic, NIST Representative
Catherine Berger
IEEE Senior Standards Program Manager, Document Development
Kathryn Bennett
IEEE Standards Program Manager, Technical Program Development
viii Copyright © 2013 IEEE. All rights reserved.
---------------------- Page: 13 ----------------------
Contents

3. Definitions ................................................................................................................................................... 2

4. Abbreviations and acronyms ....................................................................................................................... 3

7. Principles of secure network operation........................................................................................................ 4

8. MAC Security Protocol (MACsec).............................................................................................................. 5

8.3 MACsec operation ................................................................................................................... 5

9. Encoding of MACsec protocol data units.................................................................................................... 7

9.8 Packet Number (PN)................................................................................................................ 7

9.9 Secure Channel Identifier (SCI) ..............................................................................................7

10. Principles of MAC Security Entity (SecY) operation ............................................................................... 8

10.5 Secure frame generation .......................................................................................................... 8

10.6 Secure frame verification......................................................................................................... 9

10.7 SecY management ................................................................................................................. 12

13. Management protocol .............................................................................................................................. 16

13.7 Use of the MIB with extended packet numbering ................................................................. 16

14. Cipher Suites............................................................................................................................................ 17

14.1 Cipher Suite use ..................................................................................................................... 17

14.2 Cipher Suite capabilities ........................................................................................................ 18

14.4 Cipher Suite conformance ..................................................................................................... 18

14.6 GCM–AES–256..................................................................................................................... 18

14.7 GCM–AES–XPN-128 ........................................................................................................... 19

14.8 GCM–AES–XPN-256 ........................................................................................................... 20

Annex A (normative) PICS Proforma......................................................................................................... 22

A.13 Additional variant Cipher Suite capabilities.......................................................................... 22

Annex B (informative) Bibliography............................................................................................................ 23

Annex C (informative) MACsec Test Vectors .............................................................................................. 25

C.1 Integrity protection (54-octet frame) ..................................................................................... 26

C.2 Integrity protection (60-octet frame) ..................................................................................... 31

C.3 Integrity protection (65-octet frame) ..................................................................................... 34

C.4 Integrity protection (79-octet frame) ..................................................................................... 37

C.5 Confidentiality protection (54-octet frame)........................................................................... 40

C.6 Confidentiality protection (60-octet frame)........................................................................... 45

C.7 Confidentiality protection (61-octet frame)........................................................................... 48

C.8 Confidentiality protection (75-octet frame)........................................................................... 51

Copyright © 2013 IEEE. All rights reserved. ix
---------------------- Page: 14 ----------------------
Figures

Figure 8-2 MACsec operation ............................................................................................................. 6

Figure 9-2 SecTAG format .................................................................................................................. 7

Figure 10-5 Management controls and counters for secure frame verification..................................... 9

Figure 14-1 Cipher Suite Protect and Validate operations .................................................................. 17

Copyright © 2013 IEEE. All rights reserved. xi
---------------------- Page: 15 ----------------------
Tables

Table 10-1 Extended packet number recovery (examples)..................................................................... 11

Table 14-1 MACsec Cipher Suites.......................................................................................................... 18

Table C-1 Unprotected frame (example) ............................................................................................... 26

Table C-2 Integrity protected frame (example) ..................................................................................... 26

Table C-3 GCM-AES-128 Key and calculated ICV (example) ............................................................ 27

Table C-4 GCM-AES-256 Key and calculated ICV (example) ............................................................ 28

Table C-5 GCM-AES-XPN-128 Key and calculated ICV (example) ................................................... 29

Table C-6 GCM-AES-XPN-256 Key and calculated ICV (example) ................................................... 30

Table C-7 Unprotected frame (example) ............................................................................................... 31

Table C-8 Integrity protected frame (example) ..................................................................................... 31

Table C-11 GCM-AES-XPN-128 Key and calculated ICV (example) ................................................... 32

Table C-12 GCM-AES-XPN-256 Key and calculated ICV (example) ................................................... 33

Table C-13 Unprotected frame (example) ............................................................................................... 34

Table C-14 Integrity protected frame (example) ..................................................................................... 34

Table C-17 GCM-AES-XPN-128 Key and calculated ICV (example) ................................................... 35

Table C-18 GCM-AES-XPN-256 Key and calculated ICV (example) ................................................... 36

Table C-19 Unprotected frame (example) ............................................................................................... 37

Table C-20 Integrity protected frame (example) ..................................................................................... 37

Table C-23 GCM-AES-XPN-128 Key and calculated ICV (example) ................................................... 38

Table C-24 GCM-AES-XPN-256 Key and calculated ICV (example) ................................................... 39

Table C-25 Unprotected frame (example) ............................................................................................... 40

Table C-26 Confidentiality protected frame (example)........................................................................... 40

Table C-27 GCM-AES-128 Key, Secure Data, and ICV (example) ....................................................... 41

Table C-28 GCM-AES-256 Key, Secure Data, and ICV (example) ....................................................... 42

Table C-29 GCM-AES-XPN-128 Key, Secure Data, and ICV (example).............................................. 43

Table C-30 GCM-AES-XPN-256 Key, Secure Data, and ICV (example).............................................. 44

Table C-31 Unprotected frame (example) .........................................
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.