What is Network Login?
75
the port. The source MAC address in received packets is used to
determine this; all traffic from other network devices is filtered.
What is Network
Login?
Network Login controls user access at the network edge by blocking or
unblocking access on a per-port basis.
When a client device attempts to connect to a Switch port, the user is
challenged to provide their identity and authentication credentials in the
form of a user name and password. The user information is then sent to a
remote RADIUS server in the network for authentication. This information
must be successfully authenticated and authorized before the client
device is granted access to the network.
For further information about RADIUS, see
“What is RADIUS?”
on
page 80
.
The client device must be directly connected to the Switch port (no
intervening switch or hub) as the Switch uses the link status to determine
if an authorized client device is connected. Network Login will not
operate correctly if there is a “bridge” device between the client device
and the Switch port, or if there are multiple client devices attached via a
hub to the Switch port.
In addition to providing protection against unauthorized network access,
Network Login also allows the user of a port to be identified. This user
identification information can be used for service accounting or billing, or
to help network administrators resolve problems.
Network Login is a feature that is particularly relevant in publicly
accessible networks, such as education campuses or conference facilities,
which often have limited control over physical access to areas with live
network connections.
Network Login is based on the IEEE Std 802.1X-2001, which defines a
mechanism for user authentication for port-based network access
control.
How
Network Login
Works
When Network Login is enabled the Switch acts as a relay agent between
the client device that is requesting access to the network and the RADIUS
server. The authentication information that is exchanged between the
client device and the RADIUS server is received and transmitted by the
Содержание SUPERSTACK 3 3250
Страница 8: ......
Страница 20: ...20 CHAPTER 1 SWITCH FEATURES OVERVIEW...
Страница 43: ...How STP Works 43 Figure 9 STP configurations...
Страница 54: ...54 CHAPTER 6 USING TRAFFIC MANAGEMENT...
Страница 66: ...66 CHAPTER 8 SETTING UP VIRTUAL LANS...
Страница 70: ...70 CHAPTER 9 USING AUTOMATIC IP CONFIGURATION...
Страница 98: ...98 CHAPTER 11 IP ROUTING...
Страница 102: ...102 APPENDIX A CONFIGURATION RULES...
Страница 106: ...106 APPENDIX B NETWORK CONFIGURATION EXAMPLES...
Страница 132: ...132 INDEX...