102
3-10. 802.1X Configuration
802.1X port-based network access control provides a method to restrict
users to access network resources via authenticating user’s information. This
restricts users from gaining access to the network resources through a 802.1X-
enabled port without authentication. If a user wishes to touch the network through a
port under 802.1X control, he (she) must firstly input his (her) account name for
authentication and waits for gaining authorization before sending or receiving any
packets from a 802.1X-enabled port.
Before the devices or end stations can access the network resources through
the ports under 802.1X control, the devices or end stations connected to a
controlled port send the authentication request to the authenticator, the
authenticator pass the request to the authentication server to authenticate and verify,
and the server tell the authenticator if the request get the grant of authorization for
the ports.
According to IEEE802.1X, there are three components implemented. They
are Authenticator, Supplicant and Authentication server shown in Fig. 3-53.
Supplicant:
It is an entity being authenticated by an authenticator. It is used to
communicate with the Authenticator
PAE (Port Access Entity)
by
exchanging the authentication message when the Authenticator PAE
request to it.
Authenticator:
An entity facilitates the authentication of the supplicant entity. It controls
the state of the port, authorized or unauthorized, according to the result
of authentication message exchanged between it and a supplicant PAE.
The authenticator may request the supplicant to re-authenticate itself at a
configured time period. Once start re-authenticating the supplicant, the
controlled port keeps in the authorized state until re-authentication fails.
A port acting as an authenticator is thought to be two logical ports, a
controlled port and an uncontrolled port. A controlled port can only pass
the packets when the authenticator PAE is authorized, and otherwise, an
uncontrolled port will unconditionally pass the packets with PAE group
MAC address, which has the value of 01-80-c2-00-00-03 and will not be
forwarded by MAC bridge, at any time.
Authentication server:
A device provides authentication service, through EAP, to an
authenticator by using authentication credentials supplied by the
supplicant to determine if the supplicant is authorized to access the
network resource.
Содержание L2 Plus
Страница 1: ......
Страница 2: ......
Страница 3: ...16 Port SFP 8 Port Combo GbE L2 Plus Managed Switch...
Страница 4: ...2...
Страница 8: ...6 Revision History Release Date Revision 0 91 2008 03 03 A1 0 95 2008 06 25 A2 0 95 2008 07 21 A2...
Страница 36: ...34 Fig 2 15 Office Network Connection Fig 2 14 Peer to peer Network Connection...
Страница 56: ......
Страница 78: ...22 Fig 3 24...
Страница 81: ...25 Fig 3 26...
Страница 88: ...32 Fig 3 31...
Страница 96: ...40 Fig 3 39 Fig 3 40 Fig 3 41...
Страница 108: ...52 Fig 3 54 Set up Typical Network Application Rules Finish Fig 3 55 Set up Typical Network Application Rules Finish...
Страница 112: ...56 Fig 3 62 Set up VLAN Tag Priority Mapping Finish...
Страница 119: ...63 Fig 3 67 Ingress Port Fig 3 68...
Страница 121: ...65 Fig 3 70...
Страница 122: ...66 Fig 3 71 Fig 3 72 Fig 3 73 ARP...
Страница 123: ...67 Fig 3 74 ARP Fig 3 75 ARP Fig 3 76 ARP Fig 3 77 ARP...
Страница 124: ...68 Fig 3 78 ARP Fig 3 79 ARP Fig 3 80 ARP Fig 3 81 ARP...
Страница 125: ...69 Fig 3 82 ARP Fig 3 83 ARP Fig 3 84 ARP Fig 3 85 ARP Fig 3 86 ARP...
Страница 126: ...70 Fig 3 87 IPv4 Fig 3 88 IPv4 Fig 3 89 IPv4...
Страница 127: ...71 Fig 3 90 IPv4 Fig 3 91 IPv4 Fig 3 92 IPv4 Fig 3 93 IPv4 Fig 3 94 IPv4...
Страница 128: ...72 Fig 3 95 IPv4 Fig 3 96 IPv4 Fig 3 97 IPv4 Fig 3 98 IPv4 Fig 3 99 IPv4...
Страница 129: ...73 Fig 3 100 IPv4 Fig 3 101 IPv4 Fig 3 102 IPv4...
Страница 130: ...74 Fig 3 103 IPv4 Fig 3 104 IPv4 Fig 3 105 IPv4...
Страница 131: ...75 Fig 3 106 IPv4 Fig 3 107 IPv4 Fig 3 108 IPv4...
Страница 132: ...76 Fig 3 109 IPv4 Fig 3 110 IPv4 Fig 3 111 IPv4...
Страница 133: ...77 Fig 3 112 IPv4 Fig 3 113 IPv4 Fig 3 114 IPv4...
Страница 134: ...78 Fig 3 115 IPv4 Fig 3 116 IPv4 Fig 3 117 Action...
Страница 135: ...79 Fig 3 118 Rate Limiter Fig 3 119 Port Copy...
Страница 136: ...80 Fig 3 120 DMAC Filter Fig 3 121 VLAN ID Filter Fig 3 122 VLAN ID Filter...
Страница 148: ...92 Fig 3 125 Set up Policy Rules Fig 3 126 Set up Policy Rules Fig 3 127 Set up Policy Rules...
Страница 149: ...93 Fig 3 128 Set up Policy Rules Finish Fig 3 129 Set up Port Policies Fig 3 130 Set up Port Policies...
Страница 150: ...94 Fig 3 131 Set up Port Policies Fig 3 132 Set up Port Policies Finish...
Страница 151: ...95 Fig 3 133 Set up Typical Network Application Rules Fig 3 134 Set up Typical Network Application Rules...
Страница 164: ...108 Fig 3 143 802 1X Server Configuration...
Страница 168: ...112 Fig 3 145 802 1X Status...
Страница 194: ...138 Fig 3 161 Mirror Configuration...
Страница 214: ...158 Fig 4 1 Fig 4 2 LGB1005A R2 LGB1005A R2 LGB1005A R2 LGB1005A R2...