Configuration Guide
802.1x Configuration
802.1x Configuration
Overview
In an IEEE 802 LAN, users can access the network device without authorization and authorization as long as they are
connected to the network device. Therefore, an unauthorized user can access the network unobstructed by connecting
the LAN. As the wide application of LAN technology, particularly the appearance of the operating network, it is necessary
to address the safety authentication needs of the network. It has become the focus of concerns in the industry that how to
provide user with the authentication on the legality of network or device access on the basis of simple and cheap Ethernet
technologies. The IEEE 802.1x protocol is developed under such a context.
As a Port-Based Network Access Control standard, the IEEE802.1x provides LAN access point-to-point security access.
Specially designed by the IEEE Standardization Commission to tackle the safety defects of Ethernet, this standard can
provide a means to authenticate the devices and users connected to the LAN by utilizing the advantages of IEEE 802
LAN.
The IEEE 802.1x defines a mode based on Client-Server to restrict unauthorized users from accessing the network.
Before a client can access the network, it must first pass the authentication of the authentication server.
Before the client passes the authentication, only the EAPOL (Extensible Authentication Protocol over LAN) packets can
be transmitted over the network. After successful authentication, normal data streams can be transmitted over the
network.
By using 802.1x, our switches provide Authentication, Authorization, and Accounting (AAA).
Authentication: It is used to determine whether a user has the access, restricting illegal users.
Authorization: It authorizes the services available to users, controlling the rights of valid users.
Accounting: It records users' use of network resources, providing the supporting data for charging.
The 802.1x is described in the following aspects as below:
Device Roles
Authentication Initiation and Packet Interaction During Authentication
States of Authorized Users and Unauthorized Users
Topologies of Typical Applications
Device Roles
In the IEEE802.1x standard, there are three roles:
supplicant, authenticator, and authentication server.
In practice,
they are the Client, network access server (NAS) and Radius-Server.
Summary of Contents for RG-S2900G-E Series
Page 1: ...RG S2900G E Series Switch RGOS Configuration Guide Release 10 4 2b12 p1 ...
Page 91: ...Configuration Guide Configuring PoE Configuration ...
Page 133: ...Configuration Guide EEE Configuration ...
Page 319: ...Configuration Guide QinQ Configuration ...
Page 408: ......
Page 409: ...IP Routing Configuration 1 Static Route Configuration ...
Page 412: ......
Page 413: ...Multicast Configuration 1 IGMP Snooping Configuration 2 MLD Snooping Configuration ...
Page 757: ......
Page 758: ...ACL QoS Configuration 1 Access Control List Configuration 2 QoS Configuration ...
Page 801: ...Reliability Configuration 1 RLDP Configuration 2 TPP Configuration 3 SEM Configuration ...
Page 901: ...Configuration Guide ERSPAN Configuration ...
Page 902: ...Web based Configuration 1 Web based Configuration ...