80
C
HAPTER
10: M
AKING
Y
OUR
N
ETWORK
S
ECURE
This mode can only be considered totally secure if the Rada based
authentication is configured to deny access to secure network
resources, and where 802.1X Network Login does not share a port
(that is not via a hub).
What is Network
Login?
Network Login controls user access at the network edge by blocking or
unblocking access on a per-port basis.
When a client device attempts to connect to a Switch port, the user is
challenged to provide their identity and authentication credentials in the
form of a user name and password. The user information is then sent to a
remote RADIUS server in the network for authentication. This information
must be successfully authenticated and authorized before the client
device is granted access to the network.
For further information about RADIUS, see
“What is RADIUS?”
on
page 85
.
The client device must be directly connected to the Switch port (no
intervening switch or hub) as the Switch uses the link status to determine
if an authorized client device is connected. Network Login will not
operate correctly if there is a “bridge” device between the client device
and the Switch port, or if there are multiple client devices attached via a
hub to the Switch port.
In addition to providing protection against unauthorized network access,
Network Login also allows the user of a port to be identified. This user
identification information can be used for service accounting or billing, or
to help network administrators resolve problems.
Network Login is a feature that is particularly relevant in publicly
accessible networks, such as education campuses or conference facilities,
which often have limited control over physical access to areas with live
network connections.
Network Login is based on the IEEE Std 802.1X-2001, which defines a
mechanism for user authentication for port-based network access
control.
For further information about Network Login, see
“Auto VLAN
Assignment”
on
page 83
.
dua1730-0bAA03.book Page 80 Monday, July 11, 2005 11:14 AM
Содержание 3C17300-US - SuperStack 3 Switch 4226T
Страница 7: ...D STANDARDS SUPPORTED GLOSSARY INDEX dua1730 0bAA03 book Page 7 Monday July 11 2005 11 14 AM ...
Страница 8: ...dua1730 0bAA03 book Page 8 Monday July 11 2005 11 14 AM ...
Страница 14: ...14 dua1730 0bAA03 book Page 14 Monday July 11 2005 11 14 AM ...
Страница 22: ...22 CHAPTER 1 SWITCH FEATURES OVERVIEW dua1730 0bAA03 book Page 22 Monday July 11 2005 11 14 AM ...
Страница 38: ...38 CHAPTER 3 USING MULTICAST FILTERING dua1730 0bAA03 book Page 38 Monday July 11 2005 11 14 AM ...
Страница 47: ...How STP Works 47 Figure 11 STP configurations dua1730 0bAA03 book Page 47 Monday July 11 2005 11 14 AM ...
Страница 64: ...64 CHAPTER 7 STATUS MONITORING AND STATISTICS dua1730 0bAA03 book Page 64 Monday July 11 2005 11 14 AM ...
Страница 86: ...86 CHAPTER 10 MAKING YOUR NETWORK SECURE dua1730 0bAA03 book Page 86 Monday July 11 2005 11 14 AM ...
Страница 92: ...92 dua1730 0bAA03 book Page 92 Monday July 11 2005 11 14 AM ...
Страница 96: ...96 APPENDIX A CONFIGURATION RULES dua1730 0bAA03 book Page 96 Monday July 11 2005 11 14 AM ...
Страница 100: ...100 APPENDIX B NETWORK CONFIGURATION EXAMPLES dua1730 0bAA03 book Page 100 Monday July 11 2005 11 14 AM ...
Страница 108: ...108 APPENDIX D STANDARDS SUPPORTED dua1730 0bAA03 book Page 108 Monday July 11 2005 11 14 AM ...
Страница 122: ...122 INDEX dua1730 0bAA03 book Page 122 Monday July 11 2005 11 14 AM ...