![Atop EH7506 User Manual Download Page 77](http://html1.mh-extra.com/html/atop/eh7506/eh7506_user-manual_3004770077.webp)
71
2.14
Security
Two security features are provided, Port Security and 802.1X
2.14.1
Background on 802.1X
802.1X: is an IEEE standard for port-based Network-Access Control, and it provides an
authentication mechanism to devices wishing to attach to a LAN or WLAN. This protocol restricts
unauthorized clients from connecting to a LAN through ports that are open to the Internet. The
authentication basically involves three parties (Figure 2.82): a supplicant, an authenticator, and
an authentication server.
- Supplicant: A client device that requests access to the LAN.
- Authentication Server: The server performs the actual authentication. We use RADIUS (
R
emote
A
uthentication
D
ial-
I
n
U
ser
S
ervice) as the authentication server.
- Authenticator: The Authenticator is a network device that acts as a proxy between the
supplicant and the authentication server. It passes around information, verifies information
with the server, and relays responses to the supplicant.
The authenticator acts like a security guard to a protected network. The supplicant is not allowed
access through the authenticator to the protected side of the network until the supplicant’s identity
has been validated and authorized. With 802.1X authentication, a supplicant and an authenticator
exchange
EAP
(
E
xtensible
A
uthentication
P
rotocol, an authentication framework widely used by
IEEE). Then the authenticator forwards this information to the authentication server for verification. If
the authentication server confirms the request, the supplicant (client device) will be allowed to access
resources located on the protected side of the network.
RADIUS:
The Radius is a networking protocol that provides authentication, authorization and
accounting management for devices to connect and use a network service.
Summary of Contents for EH7506
Page 35: ...29 Figure 2 40 Mapping Table of DSCP ECN page...
Page 53: ...47 2 9 1 GVRP Settings Figure 2 62 GVRP setting page...
Page 55: ...49 2 9 2 GMRP Settings Figure 2 63 GMRP setting page...
Page 76: ...70...
Page 90: ...84 Figure 2 97 iA Ring Example Topology...
Page 98: ...92 Management Address Indicates neighbor s management IP address...
Page 110: ...104 Figure 2 115 Reboot page...
Page 117: ...111...