What is Network Login?
75
the port. The source MAC address in received packets is used to
determine this; all traffic from other network devices is filtered.
What is Network
Login?
Network Login controls user access at the network edge by blocking or
unblocking access on a per-port basis.
When a client device attempts to connect to a Switch port, the user is
challenged to provide their identity and authentication credentials in the
form of a user name and password. The user information is then sent to a
remote RADIUS server in the network for authentication. This information
must be successfully authenticated and authorized before the client
device is granted access to the network.
For further information about RADIUS, see
“What is RADIUS?”
on
page 80
.
The client device must be directly connected to the Switch port (no
intervening switch or hub) as the Switch uses the link status to determine
if an authorized client device is connected. Network Login will not
operate correctly if there is a “bridge” device between the client device
and the Switch port, or if there are multiple client devices attached via a
hub to the Switch port.
In addition to providing protection against unauthorized network access,
Network Login also allows the user of a port to be identified. This user
identification information can be used for service accounting or billing, or
to help network administrators resolve problems.
Network Login is a feature that is particularly relevant in publicly
accessible networks, such as education campuses or conference facilities,
which often have limited control over physical access to areas with live
network connections.
Network Login is based on the IEEE Std 802.1X-2001, which defines a
mechanism for user authentication for port-based network access
control.
How
Network Login
Works
When Network Login is enabled the Switch acts as a relay agent between
the client device that is requesting access to the network and the RADIUS
server. The authentication information that is exchanged between the
client device and the RADIUS server is received and transmitted by the
Summary of Contents for SUPERSTACK 3 3250
Page 8: ......
Page 20: ...20 CHAPTER 1 SWITCH FEATURES OVERVIEW...
Page 43: ...How STP Works 43 Figure 9 STP configurations...
Page 54: ...54 CHAPTER 6 USING TRAFFIC MANAGEMENT...
Page 66: ...66 CHAPTER 8 SETTING UP VIRTUAL LANS...
Page 70: ...70 CHAPTER 9 USING AUTOMATIC IP CONFIGURATION...
Page 98: ...98 CHAPTER 11 IP ROUTING...
Page 102: ...102 APPENDIX A CONFIGURATION RULES...
Page 106: ...106 APPENDIX B NETWORK CONFIGURATION EXAMPLES...
Page 132: ...132 INDEX...