IFS NS3601-24P/4S GE-DSSG-244 and 244-POE User Manual
172
Buttons
: Click to save changes.
: Click to undo any changes made locally and revert to previously saved values.
4.11 Authentication
This section is to control the access of the Managed Switch, includes the user access and management control.
The Authentication section contains links to the following main topics:
IEEE 802.1X Port-Based Network Access Control
MAC-Based Authentication
User Authentication
Overview of 802.1X (Port-Based) Authentication
In the 802.1X-world, the user is called the supplicant, the switch is the authenticator, and the RADIUS server is the authentication
server. The switch acts as the man-in-the-middle, forwarding requests and responses between the supplicant and the authentication
server. Frames sent between the supplicant and the switch are special 802.1X frames, known as
EAPOL (EAP Over LANs)
frames.
EAPOL frames encapsulate
EAP PDU
s (RFC3748). Frames sent between the switch and the RADIUS server are RADIUS packets.
RADIUS packets also encapsulate EAP PDUs together with other attributes like the switch's IP address, name, and the supplicant's
port number on the switch. EAP is very flexible, in that it allows for different authentication methods, like
MD5-Challenge
,
PEAP
,
and
TLS
. The important thing is that the authenticator (the switch) doesn't need to know which authentication method the supplicant
and the authentication server are using, or how many information exchange frames are needed for a particular method. The switch
simply encapsulates the EAP part of the frame into the relevant type (EAPOL or RADIUS) and forwards it.
When authentication is complete, the RADIUS server sends a special packet containing a success or failure indication. Besides
forwarding this decision to the supplicant, the switch uses it to open up or block traffic on the switch port connected to the supplicant.
Overview of MAC-Based Authentication
Unlike 802.1X, MAC-based authentication is not a standard, but merely a best-practices method adopted by the industry. In
MAC-based authentication, users are called clients, and the switch acts as the supplicant on behalf of clients. The initial frame (any
kind of frame) sent by a client is snooped by the switch, which in turn uses the client's MAC address as both username and
password in the subsequent EAP exchange with the RADIUS server. The 6-byte MAC address is converted to a string on the
following form "xx-xx-xx-xx-xx-xx", that is, a dash (-) is used as separator between the lower-cased hexadecimal digits. The switch
only supports the MD5-Challenge authentication method, so the RADIUS server must be configured accordingly.
When authentication is complete, the RADIUS server sends a success or failure indication, which in turn causes the switch to open
up or block traffic for that particular client, using static entries into the MAC Table. Only then will frames from the client be forwarded
on the switch. There are no EAPOL frames involved in this authentication, and therefore, MAC-based Authentication has nothing to
do with the 802.1X standard.
The advantage of MAC-based authentication over 802.1X is that several clients can be connected to the same port (e.g. through a
3rd party switch or a hub) and still require individual authentication, and that the clients don't need special supplicant software to
authenticate. The disadvantage is that MAC addresses can be spoofed by malicious users, equipment whose MAC address is a
valid RADIUS user can be used by anyone, and only the MD5-Challenge method is supported.
The 802.1X and MAC-Based Authentication configuration consists of two sections, a system- and a port-wide.
Overview of User Authentication
It is allowed to configure the Managed Switch to authenticate users logging into the system for management access using local or
remote authentication methods, such as telnet and Web browser. This Managed Switch provides secure network management
access using the following options:
Remote Authentication Dial-in User Service (RADIUS)
Terminal Access Controller Access Control System Plus ()
Local user name and Priviledge Level control
RADIUS and
are logon authentication protocols that use software running on a central server to control access to
RADIUS-aware or TACACS-aware devices on the network. An
authentication server
contains a database of multiple user name /
password pairs with associated privilege levels for each user that requires management access to the Managed Switch.
Содержание GE-DSSG-244
Страница 1: ...P N 1072570 REV 00 10 ISS 13JUN13 IFS NS3601 24P 4S GE DSSG 244 GE DSSG 244 POE User Manual ...
Страница 10: ......
Страница 38: ...IFS NS3601 24P 4S GE DSSG 244 and 244 POE User Manual 36 ...
Страница 43: ...IFS NS3601 24P 4S GE DSSG 244 and 244 POE User Manual 41 Figure 4 1 5 IFS Managed Switch Main Functions Menu ...
Страница 128: ...IFS NS3601 24P 4S GE DSSG 244 and 244 POE User Manual 126 Figure 4 7 13 MST1 MSTI Port Configuration page screenshot ...
Страница 132: ...IFS NS3601 24P 4S GE DSSG 244 and 244 POE User Manual 130 Figure 4 8 1 Multicast Service ...
Страница 136: ...IFS NS3601 24P 4S GE DSSG 244 and 244 POE User Manual 134 Figure 4 8 6 IGMP Port Related Configuration page screenshot ...
Страница 142: ...IFS NS3601 24P 4S GE DSSG 244 and 244 POE User Manual 140 Figure 4 8 10 MVR Configuration page screenshot ...
Страница 161: ...IFS NS3601 24P 4S GE DSSG 244 and 244 POE User Manual 159 Figure 4 9 14 Voice VLAN Configuration page screenshot ...
Страница 388: ...User s Manual of NS3601 24P 4S Series 386 ...