
User’s Manual of LRP-822CS/LRP-1622CS
216
4.9.1.1 Understanding IEEE 802.1X Port-based Authentication
The IEEE 802.1X standard defines a client-server-based access control and authentication protocol that restricts unauthorized
clients from connecting to a LAN through publicly accessible ports. The authentication server authenticates each client
connected to a switch port before making available any services offered by the switch or the LAN.
Until the cl
.1X access control allow
over LAN (EAPOL)
traf
ent is connected. After authentic
l traffic can pass through the
port.
This section includes this conceptual information:
Device Roles
Authentication Initiation and Message Exchange
Ports in Authorized and Unauthorized States
s
network have specific roles as shown below.
ient is authenticated, 802
s only
Extensible Authentication Protocol
fic through the port to which the cli
ation is successful, norma
Device Role
With 802.1X port-based authentication, the devices in the
Figure 4-9-1
Client
—the device (workstation) that requests access to the LAN and switch services and responds to requests from
ant client software such as that offered in the Microsoft
.1X specification.)
the switch. The workstation must be running 802.1X-compli
Windows XP operating system. (The client is the
supplicant
in the IEEE 802