Chapter 9: 802.1x Port-based Network Access Control
110
Section I: Using the Menus Interface
Force-unauthorized
-
Places the port in the unauthorized state,
ignoring all attempts by the client to authenticate. This port control
setting blocks all users from accessing the network through the port
and is similar to disabling a port and can be used to secure a port from
use. The port continues to forward EAPOL packets, but discards all
other packets, including multicast and broadcast packets.
Force-authorized - Disables IEEE 802.1x port-based authentication
and causes the port to transition to the authorized state without any
authentication exchange required. The port transmits and receives
normal traffic without 802.1x-based authentication of the client. This is
the default setting. Use this port control setting for those ports where
there are network devices that are not to be authenticated.
Figure 26 illustrates the concept of the authenticator port control settings.
Figure 26. Example of the Authenticator Role
Port 2 is set to Auto. The end node connected to the port must use its
802.1x client software and provide a username and password to send
or receive traffic from the switch.
Port 18 is set to the Force-authorized setting so that the end node
connected to the port does not have to provide a user name or
password to send or receive traffic from the switch. In the example, the
node is the RADIUS authentication server. Since the server cannot
authenticate itself, its port must be set to Force-authorized in order for
it to pass traffic through the port.
Port 23 is set to Force-unauthorized to prevent anyone for using the
port.
RADIUS
Authentication
Server
Supplicant with
802.1x Client
Software
Port 2
802.1x Port Control
Setting: Auto
Port 18
802.1x Port Control:
Setting: Force-authorized
Port 23
802.1x Port Control:
Setting: Force-unauthorized
Summary of Contents for AT-S79
Page 6: ...Contents 6 ...
Page 10: ...Tables 10 ...
Page 22: ...22 Section I Using the Menus Interface ...
Page 28: ...Chapter 2 Getting Started with the Menus Interface 28 Section I Using the Menus Interface ...
Page 64: ...Chapter 5 Port Trunking 64 Section I Using the Menus Interface ...
Page 70: ...Chapter 6 Port Mirroring 70 Section I Using the Menus Interface ...
Page 94: ...Chapter 7 Virtual LANs 94 Section I Using the Menus Interface ...
Page 106: ...Chapter 8 Quality of Service QoS 106 Section I Using the Menus Interface ...
Page 118: ...Chapter 9 802 1x Port based Network Access Control 118 Section I Using the Menus Interface ...
Page 124: ...Chapter 10 RADIUS Authentication Protocol 124 Section I Using the Menus Interface ...
Page 134: ...134 Section II Using the Web Browser Interface ...
Page 166: ...Chapter 15 Port Configuration 166 Section II Using the Web Browser Interface ...
Page 172: ...Chapter 16 Port Trunking 172 Section II Using the Web Browser Interface ...
Page 176: ...Chapter 17 Port Mirroring 176 Section II Using the Web Browser Interface ...
Page 186: ...Chapter 18 Virtual LANs 186 Section II Using the Web Browser Interface ...
Page 192: ...Chapter 19 Quality of Service QoS 192 Section II Using the Web Browser Interface ...
Page 204: ...Chapter 23 Management Software Updates 204 Section II Using the Web Browser Interface ...
Page 208: ...Appendix A AT S79 Software Default Settings 208 ...