
IES-1248-51V Support Notes
43
will go via 0/34. And the 0/33 get the higher priority. The video traffic will go first
when the two traffics arrive at the same time.
802.1x Application
IEEE 802.1x port-based authentication is desired to prevent unauthorized ports
(clients) from gaining access to the network. It is an extended authentication protocol
that allows support of RADIUS (Remote Authentication Dial in User Service,
RFC2138, 2139) for centralized user profile management on a network RADIUS
server.
We want to deploy 802.1x environment in this application. The following figure
shows the 802.1x example. PC1(supplicant) and PC2(supplicant) want to access to the
application server. If PC1 is not unauthorized, the traffic from PC1 to application
server will be blocked. If PC2 is an authorized client, then it can access to the
application server. From the figure, IES-1248-51V acts as an authenticator.
Authentication
Server (RADIUS)
Station/
Application server
Authorized
Unauthorized
X
Port x
(Authenticator)
IES-1248-51V
ADSL
ADSL
Port y
PC 1
(Supplicant)
PC 2
(Supplicant)
How to set up an 802.1x environment.
We should configure Authenticator, RADIUS and Supplicant three parts in 802.1x
All contents copyright (c) 2007 ZyXEL Communications Corporation.