
Chapter 4: Web configuration
NS3562-8P-2S User Manual
143
Ports in authorized and unauthorized states
The switch port state determines if the client is granted access to the network. The port
starts in the unauthorized state. While in this state, the port disallows all ingress and
egress traffic except for 802.1X protocol packets. When a client is successfully
authenticated, the port transitions to the authorized state, allowing all traffic for the
client to flow normally.
If a client that does not support 802.1X is connected to an unauthorized 802.1X port,
the switch requests the client's identity. In this situation, the client does not respond to
the request, the port remains in the unauthorized state, and the client is not granted
access to the network.
In contrast, when an 802.1X-enabled client connects to a port that is not running the
802.1X protocol, the client initiates the authentication process by sending the EAPOL-
start frame. When no response is received, the client sends the request a fixed number
of times. If no response is received, the client begins sending frames as if the port is in
the authorized state
If the client is successfully authenticated (receives an Accept frame from the
authentication server), the port state changes to authorized, and all frames from the
authenticated client are allowed through the port. If the authentication fails, the port
remains in the unauthorized state, but authentication can be retried. If the
authentication server cannot be reached, the switch can retransmit the request. If no
response is received from the server after the specified number of attempts,
authentication fails and network access is not granted.
When a client logs off, it sends an EAPOL-logoff message, causing the switch port to
transition to the unauthorized state.
If the link state of a port transitions from up to down, or if an EAPOL-logoff frame is
received, the port returns to the unauthorized state.
802.1X setting
Configure the IEEE 802.1X authentication system on this page.
The IEEE 802.1X standard defines a port-based access control procedure that
prevents unauthorized access to a network by requiring users to first submit credentials
for authentication. One or more central servers, the backend servers, determine
whether the user is allowed access to the network. These backend (RADIUS) servers
are configured on the "Security
→
802.1X Access Control
→
802.1X Setting" page. The
IEEE802.1X standard defines port-based operation, but non-standard variants
overcome security limitations as demonstrating in the following sections.
The page includes the following fields:
Содержание NS3562-8P-2S
Страница 1: ...NS3562 8P 2S User Manual P N 1073225 EN REV B ISS 01MAR19 ...
Страница 19: ...Chapter 2 Installation NS3562 8P 2S User Manual 17 Physical dimensions Dimensions W x D x H 178 x 25 x 134 mm ...
Страница 116: ...Chapter 4 Web configuration 114 NS3562 8P 2S User Manual Multicast service Multicast flooding ...