254
3rd party switch or a hub) and still require individual authentication, and that the clients don't need special supplicant software to
authenticate. The disadvantage is that MAC addresses can be spoofed by malicious users, equipment whose MAC address is a
valid RADIUS user can be used by anyone, and only the MD5-Challenge method is supported.
The 802.1X and MAC-Based Authentication configuration consists of two sections, a system- and a port-wide.
Overview of User Authentication
It is allowed to configure the Managed Switch to authenticate users logging into the system for management access using local or
remote authentication methods, such as telnet and Web browser. This Managed Switch provides secure network management
access using the following options:
Remote Authentication Dial-in User Service (RADIUS)
Terminal Access Controller Access Control System Plus ()
Local user name and Priviledge Level control
RADIUS and
are logon authentication protocols that use software running on a central server to control access to
RADIUS-aware or TACACS-aware devices on the network. An
authentication server
contains a database of multiple user name /
password pairs with associated privilege levels for each user that requires management access to the Managed Switch.
4.11.1 Understanding IEEE 802.1X Port-Based Authentication
The IEEE 802.1X standard defines a client-server-based access control and authentication protocol that restricts unauthorized
clients from connecting to a LAN through publicly accessible ports. The authentication server authenticates each client connected to
a switch port before making available any services offered by the switch or the LAN.
Until the client is authenticated, 802.1X access control allows only
Extensible Authentication Protocol over LAN (EAPOL)
traffic
through the port to which the client is connected. After authentication is successful, normal traffic can pass through the port.
This section includes this conceptual information:
Device Roles
Authentication Initiation and Message Exchange
Ports in Authorized and Unauthorized States
Device Roles
With 802.1X port-based authentication, the devices in the network have specific roles as shown below.
Содержание NS4702-24P-4S-4X
Страница 1: ...NS4702 24P 4S 4X User Manual P N 1072829 REV 00 01 ISS 14JUL14 ...
Страница 23: ...23 Storage Temperature 10 70 degrees C Relative Humidity 5 95 non condensing ...
Страница 164: ...164 Figure 4 8 2 Multicast Flooding ...
Страница 183: ...183 Figure 4 8 14 IGMP Snooping VLAN Configuration Page Screenshot ...
Страница 189: ...189 Figure 4 8 17 MLD Snooping Groups Information Page Screenshot ...
Страница 203: ...203 Buttons Click to apply changes Click to undo any changes made locally and revert to previously saved values ...
Страница 208: ...208 Figure 4 9 6 QoS Egress Port Tag Remarking Page Screenshot ...
Страница 218: ...218 Deletes the QCE The lowest plus sign adds a new entry at the bottom of the list of QCL ...
Страница 229: ...229 Figure 4 9 18 Voice VLAN Configuration Page Screenshot ...
Страница 252: ...252 Buttons Click to apply changes Click to undo any changes made locally and revert to previously saved values ...
Страница 291: ...291 measurement is 100 ms A value of 0 ms indicates that there hasn t been round trip communication with the server yet ...
Страница 299: ...299 Figure 4 11 17 Add User Properties Screen Figure 4 11 18 Add User Properties Screen ...
Страница 336: ...336 Figure 4 14 2 LLDPMED Configuration Page Screenshot ...
Страница 357: ...357 Figure 4 15 4 VeriPHY Cable Diagnostics Page Screenshot ...
Страница 367: ...367 ...
Страница 375: ...375 Figure 4 16 10 Port Power Consumption Screenshot Buttons Click to refresh the page immediately ...
Страница 391: ...391 ...