![SNR S2940-8G-v2 Configuration Manual Download Page 305](http://html1.mh-extra.com/html/snr/s2940-8g-v2/s2940-8g-v2_configuration-manual_1310630305.webp)
SNR S2940-8G-v2 Switch Configuration Guide
802.1x Configuration
Chapter 45
802.1x Configuration
45.1
Introduction to 802.1x
The 802.1x protocol originates from 802.11 protocol, the wireless LAN protocol of IEEE, which is
designed to provide a solution to doing authentication when users access a wireless LAN. The
LAN defined in IEEE 802 LAN protocol does not provide access authentication, which means as
long as the users can access a LAN controlling device (such as a LAN Switch), they will be able
to get all the devices or resources in the LAN. There was no looming danger in the environment
of LAN in those primary enterprise networks.
However, along with the boom of applications like mobile office and service operating networks,
the service providers should control and configure the access from user. The prevailing application
of WLAN and LAN access in telecommunication networks, in particular, make it necessary to
control ports in order to implement the user-level access control. And as a result, IEEE LAN/WAN
committee defined a standard, which is 802.1x, to do Port-Based Network Access Control. This
standard has been widely used in wireless LAN and ethernet.
'Port-Based Network Access Control' means to authenticate and control the user devices on
the level of ports of LAN access devices. Only when the user devices connected to the ports pass
the authentication, can they access the resources in the LAN, otherwise, the resources in the LAN
won't be available.
45.1.1
The Authentication Structure of 802.1x
The system using 802.1x has a typical Client/Server structure, which contains three entities (as
illustrated in the next figure): Supplicant system, Authenticator system, and Authentication server
system.
• The supplicant system is an entity on one end of the LAN segment, should be authenticated
by the access controlling unit on the other end of the link. A Supplicant system usually
is a user terminal device. Users start 802.1x authentication by starting supplicant system
software. A supplicant system should support EAPOL (Extensible Authentication Protocol
over LAN).
• The authenticator system is another entity on one end of the LAN segment to authenticate
the supplicant systems connected. An authenticator system usually is a network device
supporting 802,1x protocol, providing ports to access the LAN for supplicant systems. The
ports provided can either be physical or logical.
305
Summary of Contents for S2940-8G-v2
Page 11: ...SNR S2940 8G v2 Switch Configuration Guide Part I Basic Management Configuration 11...
Page 46: ...SNR S2940 8G v2 Switch Configuration Guide Part II Port Configuration 46...
Page 123: ...SNR S2940 8G v2 Switch Configuration Guide Part III VLAN and MAC Table Configuration 123...
Page 164: ...SNR S2940 8G v2 Switch Configuration Guide Part IV MSTP Configuration 164...
Page 198: ...SNR S2940 8G v2 Switch Configuration Guide Part VI L3 Forward and ARP Configuration 198...
Page 218: ...SNR S2940 8G v2 Switch Configuration Guide Part VII DHCP Configuration 218...
Page 257: ...SNR S2940 8G v2 Switch Configuration Guide Part VIII Multicast Protocol 257...
Page 278: ...SNR S2940 8G v2 Switch Configuration Guide Part IX Security Function Configuration 278...
Page 376: ...SNR S2940 8G v2 Switch Configuration Guide Part X Reliability Configuration 376...
Page 395: ...SNR S2940 8G v2 Switch Configuration Guide Part XI Flow Monitor Configuration 395...
Page 403: ...SNR S2940 8G v2 Switch Configuration Guide Part XII Network Time Management Configuration 403...
Page 411: ...SNR S2940 8G v2 Switch Configuration Guide Part XIII Debugging and Diagnosis 411...