
User’s Guide
FUJITSU PSWITCH
December/2018
103
Silent Time
After several unsuccessful logins, the user will be locked out for a certain silent
time interval.
3.1.5.5.
802.1X
3.1.5.5.1.
802.1X Port based Authenticator
Local Area Networks (LANs) are often deployed in environments that permit the
attachment of unauthorized devices. The networks also permit unauthorized users
to attempt to access the LAN through existing equipment. In such environments,
the administrator may desire to restrict access to the services offered by the LAN.
Port-based network access control makes use of the physical characteristics of LAN
infrastructures to provide a means of authenticating and authorizing devices
attached to a LAN port. Port-based network access control prevents access to the
port in cases in which the authentication and authorization process fails. A port is
defined as a single point of attachment to the LAN.
The software also supports VLAN assignment clients based on the RADIUS server
authentication.
3.1.5.5.2.
802.1X MAC based Authenticator
The MAC-Based Authentication is an extension to the 802.1X IEEE standard. This
feature focuses on supporting authentication of multiple clients per port; that is,
though a port is authorized by one of the clients connected to the port, the other
clients that are connected to the same port of the switch do not have access to the
port. Instead every client must authenticate itself before the client can get access
to the port.
When a client authenticates itself initially on the network, the switch acts as the
authenticator to the clients on the network and forwards the authentication
request to the RADIUS server. If the authentication succeeds, the port is placed in
authorized state and the client is able to forward or receive traffic through the port.
In a standard Dot1X scenario, all subsequent clients in the network that are
connected to the same port need not authenticate to use the port on the switch.
When MAC-based Dot1X authentication is enabled, all the subsequent clients in
the network that are connected to the same port need to authenticate themselves
to use the port on the switch.