Configuring Port-Based and Client-Based Access Control (802.1X)
General 802.1X Authenticator Operation
General 802.1X Authenticator Operation
This operation provides security on a point-to-point link between a client and
the switch, where both devices are 802.1X-aware. (If you expect desirable
clients that do not have the necessary 802.1X supplicant software, you can
provide a path for downloading such software by using the 802.1X Open VLAN
mode—refer to “802.1X Open VLAN Mode” on page 10-24.)
Example of the Authentication Process
Suppose that you have configured a port on the switch for 802.1X authentica
tion operation, which blocks access to the LAN through that port. If you then
connect an 802.1X-aware client (supplicant) to the port and attempt to log on:
1. The switch responds with an identity request.
2. The client responds with a user name that uniquely defines this request
for the client.
3. The switch responds in one of the following ways:
•
If 802.1X on the switch is configured for RADIUS authentication, the
switch then forwards the request to a RADIUS server.
i.
The server responds with an access challenge which the switch
forwards to the client.
ii. The client then provides identifying credentials (such as a user
certificate), which the switch forwards to the RADIUS server.
iii. The RADIUS server then checks the credentials provided by the
client.
iv. If the client is successfully authenticated and authorized to con
nect to the network, then the server notifies the switch to allow
access to the client. Otherwise, access is denied and the port
remains blocked.
•
If 802.1X on the switch is configured for local authentication, then:
i.
The switch compares the client’s credentials to the username and
password configured in the switch (Operator level).
ii. If the client is successfully authenticated and authorized to con
nect to the network, then the switch allows access to the client.
Otherwise, access is denied and the port remains blocked for that
client.
10-9
Summary of Contents for J8697A
Page 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Page 2: ......
Page 22: ...Product Documentation Feature Index xx ...
Page 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Page 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Page 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Page 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Page 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Page 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Page 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Page 388: ...10 Index ...
Page 389: ......