
C
HAPTER
4
| Configuring the Switch
Configuring 802.1X Port Authentication
– 82 –
C
ONFIGURING
802.1X P
ORT
A
UTHENTICATION
Network switches can provide open and easy access to network resources
by simply attaching a client PC. Although this automatic configuration and
access is a desirable feature, it also allows unauthorized personnel to easily
intrude and possibly gain access to sensitive network data.
The IEEE 802.1X (dot1x) standard defines a port-based access control
procedure that prevents unauthorized access to a network by requiring
users to first submit credentials for authentication. Access to all switch
ports in a network can be centrally controlled from a server, which means
that authorized users can use the same credentials for authentication from
any point within the network.
This switch uses the Extensible Authentication Protocol over LANs (EAPOL)
to exchange authentication protocol messages with the client, and a
remote RADIUS authentication server to verify user identity and access
rights. When a client (i.e., Supplicant) connects to a switch port, the switch
(i.e., Authenticator) responds with an EAPOL identity request. The client
provides its identity (such as a user name) in an EAPOL response to the
switch, which it forwards to the RADIUS server. The RADIUS server verifies
the client identity and sends an access challenge back to the client. The
EAP packet from the RADIUS server contains not only the challenge, but
the authentication method to be used. The client can reject the
authentication method and request another, depending on the
configuration of the client software and the RADIUS server. The encryption
method used by IEEE 802.1X to pass authentication messages can be MD5
(Message-Digest 5), TLS (Transport Layer Security), PEAP (Protected
Extensible Authentication Protocol), or TTLS (Tunneled Transport Layer
Security). However, note that the only encryption method supported by
MAC-Based authentication is MD5. The client responds to the appropriate
method with its credentials, such as a password or certificate. The RADIUS
server verifies the client credentials and responds with an accept or reject
packet. If authentication is successful, the switch allows the client to
access the network. Otherwise, network access is denied and the port
remains blocked.
802.1x
client
RADIUS
server
1. Client attempts to access a switch port.
2. Switch sends client an identity request.
3. Client sends back identity information.
4. Switch forwards this to authentication server.
5. Authentication server challenges client.
6. Client responds with proper credentials.
7. Authentication server approves access.
8. Switch grants client access to this port.
Содержание ES4528V-38
Страница 1: ...Management Guide www edge core com 28 Port Gigabit Ethernet Switch...
Страница 2: ......
Страница 4: ......
Страница 6: ...ABOUT THIS GUIDE 6...
Страница 22: ...FIGURES 22...
Страница 26: ...SECTION Getting Started 26...
Страница 46: ...CHAPTER 2 Initial Switch Configuration Managing System Files 46...
Страница 48: ...SECTION Web Configuration 48...
Страница 75: ...CHAPTER 4 Configuring the Switch Creating Trunk Groups 75 Figure 11 LACP Port Configuration...
Страница 135: ...CHAPTER 4 Configuring the Switch Simple Network Management Protocol 135 Figure 34 SNMP System Configuration...
Страница 186: ...CHAPTER 6 Performing Basic Diagnostics Running Cable Diagnostics 186...
Страница 191: ...CHAPTER 7 Performing System Maintenance Managing Configuration Files 191 Figure 72 Configuration Upload...
Страница 192: ...CHAPTER 7 Performing System Maintenance Managing Configuration Files 192...
Страница 242: ...CHAPTER 12 Port Commands 242...
Страница 248: ...CHAPTER 13 Link Aggregation Commands 248...
Страница 266: ...CHAPTER 15 RSTP Commands 266...
Страница 276: ...CHAPTER 16 IEEE 802 1X Commands 276...
Страница 286: ...CHAPTER 17 IGMP Commands 286...
Страница 294: ...CHAPTER 18 LLDP Commands 294...
Страница 300: ...CHAPTER 19 MAC Commands 300...
Страница 310: ...CHAPTER 21 PVLAN Commands 310...
Страница 322: ...CHAPTER 22 QoS Commands 322...
Страница 356: ...CHAPTER 26 SNMP Commands 356...
Страница 359: ...CHAPTER 27 HTTPS Commands 359 EXAMPLE HTTPS redirect enable HTTPS...
Страница 360: ...CHAPTER 27 HTTPS Commands 360...
Страница 366: ...CHAPTER 29 UPnP Commands 366...
Страница 374: ...CHAPTER 31 Firmware Commands 374...
Страница 376: ...SECTION Appendices 376...
Страница 390: ...GLOSSARY 390...
Страница 394: ...INDEX 394 W web interface access requirements 49 configuration buttons 50 home page 50 menu list 51 panel display 51...
Страница 395: ......
Страница 396: ...ES4528V E072009 ST R01 149100000014A...