Avaya C360 Layer 2 Features
126 Installation and Configuration Guide Avaya C360 Multilayer Stackable Switches, version 4.5
IEEE 802.1x (Port Based Network Access Control)
Port Based Network Access Control (IEEE 802.1x) is a method for performing authentication to
obtain access to IEEE 802 LANs. The protocol defines an interaction between 3 entities:
●
Supplicant - an entity at one end of a point-to-point LAN segment that is being
authenticated by an authenticator attached to the other end of that link.
●
Authenticator - an entity at one end of a point-to-point LAN segment that facilitates
authentication of the entity attached to the other end of that link; in this case, the C360.
●
Authentication (RADIUS) Server - an entity that provides an authentication service to an
authenticator. This service determines, from the credentials provided by the supplicant,
whether the supplicant is authorized to access the services provided by the authenticator.
The process begins with the supplicant trying to access a certain restricted network resource,
and upon successful authentication by the authentication server, the supplicant is granted
access to the network resources.
How 802.1x Authentication Works
802.1x provides a means of authenticating and authorizing users attached to a LAN port and of
preventing access to that port in cases where the authentication process fails. The
authentication procedure is port based, which means:
●
access control is achieved by enforcing authentication on connected ports
●
if an end-point station that connects to a port is not authorized, the port state is set to
"unauthorized" which closes the port to any traffic.
●
As a result of an authentication attempt, the C360 port can be either in a "blocked" or a
"forwarding" state.
802.1x interacts with existing standards to perform its authentication operation. Specifically, it
makes use of Extensible Authentication Protocol (EAP) messages encapsulated within Ethernet
frames (EAPOL), and EAP over RADIUS for the communication between the Authenticator and
the Authentication Server.
Содержание C360 Manager
Страница 12: ...Contents 12 Installation and Configuration Guide Avaya C360 Multilayer Stackable Switches version 4 5...
Страница 17: ...Issue 2 July 2005 17 Section 1 Avaya C360 Overview...
Страница 18: ...18 Installation and Configuration Guide Avaya C360 Multilayer Stackable Switches version 4 5...
Страница 29: ...Issue 2 July 2005 29 Section 2 Installing the C360...
Страница 30: ...30 Installation and Configuration Guide Avaya C360 Multilayer Stackable Switches version 4 5...
Страница 52: ...Installation 52 Installation and Configuration Guide Avaya C360 Multilayer Stackable Switches version 4 5...
Страница 91: ...Issue 2 July 2005 91 Section 3 Avaya C360 Configuration...
Страница 92: ...92 Installation and Configuration Guide Avaya C360 Multilayer Stackable Switches version 4 5...
Страница 210: ...C360 Device Manager 210 Installation and Configuration Guide Avaya C360 Multilayer Stackable Switches version 4 5...
Страница 211: ...Issue 2 July 2005 211 Section 4 Troubleshooting and Maintaining the Avaya C360...
Страница 212: ...212 Installation and Configuration Guide Avaya C360 Multilayer Stackable Switches version 4 5...
Страница 222: ...Maintenance 222 Installation and Configuration Guide Avaya C360 Multilayer Stackable Switches version 4 5...
Страница 230: ...Mixed Stacks 230 Installation and Configuration Guide Avaya C360 Multilayer Stackable Switches version 4 5...
Страница 248: ...248 Installation and Configuration Guide Avaya C360 Multilayer Stackable Switches version 4 5 Index...