Chapter 33: 802.1x Port-based Network Access Control
386
Section VIII: Port Security
Note
A supplicant connected to an authenticator port set to force-
authorized must have 802.1x client software if the port’s
authenticator mode is 802.1x. Though the force-authorized setting
prevents an authentication exchange, the supplicant must still have
the client software to forward traffic through the port.
Force-unauthorized - Causes the port to remain in the unauthorized
state, ignoring all attempts by the supplicant to authenticate. The port
forwards EAPOL frames, but discards all other traffic. This setting is
analogous to disabling a port.
As mentioned earlier, the switch itself does not authenticate the user
names and passwords from the clients. That function is performed by the
authentication server and the RADIUS server software. The switch acts as
an intermediary for the authentication server by denying access to the
network by the client until the client has been validated by the
authentication server.
Supplicant Role
A switch port in the supplicant role acts as a client. The port assumes it
must log in by providing a valid user name and password to whatever
device it is connected to, typically another switch port.
Figure 40 illustrates the port role. Port 11 on switch B has been set to the
supplicant role. Now, whenever switch B is power cycled or reset and
initiates a link with switch A, it must log on by providing a username and
password. (You enter this information when you configure the port for the
supplicant role.)
Figure 40. Example of the Supplicant Role
Switch A
Switch B
FAULT
RPS
MASTER
POWER
CLASS 1
LASER PRODUCT
STATUS
TERMINAL
PORT
1
3
5
7
9
11
2
4
6
8
10
12
13
15
17
19
21
23R
14
16
18
20
22
24R
AT-9424T/SP
Gigabit Ethernet Switch
1
3
5
7
9
11
13
15
17
19
21
23R
2
4
6
8
10
12
14
16
18
20
22
24R
23
24
L/A
D/C
D/C
L/A
D/C
L/A
1000 LINK / ACT
HDX / COL
FDX
10/100 LINK / ACT
PORT ACTIVITY
L/A
1000 LINK / ACT
SFP
SFP
24
SFP
23
FAULT
RPS
MASTER
POWER
CLASS 1
LASER PRODUCT
STATUS
TERMINAL
PORT
1
3
5
7
9
11
2
4
6
8
10
12
13
15
17
19
21
23R
14
16
18
20
22
24R
AT-9424T/SP
Gigabit Ethernet Switch
1
3
5
7
9
11
13
15
17
19
21
23R
2
4
6
8
10
12
14
16
18
20
22
24R
23
24
L/A
D/C
D/C
L/A
D/C
L/A
1000 LINK / ACT
HDX / COL
FDX
10/100 LINK / ACT
PORT ACTIVITY
L/A
1000 LINK / ACT
SFP
SFP
24
SFP
23
Port 6
in
Authenticator
Role
Port 11
in Supplicant Role
RADIUS
Authentication
Server
Summary of Contents for AT-S63
Page 14: ...Figures 14 ...
Page 18: ...Tables 18 ...
Page 28: ...28 Section I Basic Operations ...
Page 58: ...Chapter 1 Overview 58 ...
Page 76: ...Chapter 2 AT 9400Ts Stacks 76 Section I Basic Operations ...
Page 96: ...Chapter 5 MAC Address Table 96 Section I Basic Operations ...
Page 114: ...Chapter 8 Port Mirror 114 Section I Basic Operations ...
Page 116: ...116 Section II Advanced Operations ...
Page 146: ...Chapter 12 Access Control Lists 146 Section II Advanced Operations ...
Page 176: ...Chapter 14 Quality of Service 176 Section II Advanced Operations ...
Page 196: ...196 Section III Snooping Protocols ...
Page 204: ...Chapter 18 Multicast Listener Discovery Snooping 204 Section III Snooping Protocols ...
Page 216: ...Chapter 20 Ethernet Protection Switching Ring Snooping 216 Section III Snooping Protocols ...
Page 218: ...218 Section IV SNMPv3 ...
Page 234: ...234 Section V Spanning Tree Protocols ...
Page 268: ...268 Section VI Virtual LANs ...
Page 306: ...Chapter 27 Protected Ports VLANs 306 Section VI Virtual LANs ...
Page 320: ...320 Section VII Internet Protocol Routing ...
Page 360: ...Chapter 30 BOOTP Relay Agent 360 Section VII Routing ...
Page 370: ...Chapter 31 Virtual Router Redundancy Protocol 370 Section VII Routing ...
Page 372: ...372 Section VIII Port Security ...
Page 402: ...Chapter 33 802 1x Port based Network Access Control 402 Section VIII Port Security ...
Page 404: ...404 Section IX Management Security ...
Page 436: ...Chapter 36 PKI Certificates and SSL 436 Section IX Management Security ...
Page 454: ...Chapter 38 TACACS and RADIUS Protocols 454 Section IX Management Security ...
Page 462: ...Chapter 39 Management Access Control List 462 Section IX Management Security ...
Page 532: ...Appendix D MIB Objects 532 ...