264
Force Authorized
In this mode, the switch will send one EAPOL Success frame when the port link
comes up, and any client on the port will be allowed network access without
authentication.
Force Unauthorized
In this mode, the switch will send one EAPOL Failure frame when the port link
comes up, and any client on the port will be disallowed network access.
Port-based 802.1X
In the 802.1X-world, the user is called the supplicant, the switch is the
authenticator, and the RADIUS server is the authentication server. The
authenticator acts as the man-in-the-middle, forwarding requests and responses
between the supplicant and the authentication server. Frames sent between the
supplicant and the switch are special 802.1X frames, known as EAPOL (EAP
Over LANs) frames. EAPOL frames encapsulate EAP PDUs (RFC3748). Frames
sent between the switch and the RADIUS server are RADIUS packets. RADIUS
packets also encapsulate EAP PDUs together with other attributes like the
switch's IP address, name, and the supplicant's port number on the switch. EAP
is very flexible, in that it allows for different authentication methods, like
MD5-Challenge, PEAP, and TLS. The important thing is that the authenticator
(the switch) doesn't need to know which authentication method the supplicant
and the authentication server are using, or how many information exchange
frames are needed for a particular method. The switch simply encapsulates the
EAP part of the frame into the relevant type (EAPOL or RADIUS) and forwards it.
When authentication is complete, the RADIUS server sends a special packet
containing a success or failure indication. Besides forwarding this decision to the
supplicant, the switch uses it to open up or block traffic on the switch port
connected to the supplicant.
Note
:
Suppose two backend servers are enabled and that the server timeout is
configured to X seconds (using the AAA configuration Page), and suppose that
the first server in the list is currently down (but not considered dead). Now, if the
supplicant retransmits EAPOL Start frames at a rate faster than X seconds, then
it will never get authenticated, because the switch will cancel on-going backend
authentication server requests whenever it receives a new EAPOL Start frame
from the supplicant. And since the server hasn't yet failed (because the X
Содержание NS4702-24P-4S-4X
Страница 1: ...NS4702 24P 4S 4X User Manual P N 1072829 REV 00 01 ISS 14JUL14 ...
Страница 23: ...23 Storage Temperature 10 70 degrees C Relative Humidity 5 95 non condensing ...
Страница 164: ...164 Figure 4 8 2 Multicast Flooding ...
Страница 183: ...183 Figure 4 8 14 IGMP Snooping VLAN Configuration Page Screenshot ...
Страница 189: ...189 Figure 4 8 17 MLD Snooping Groups Information Page Screenshot ...
Страница 203: ...203 Buttons Click to apply changes Click to undo any changes made locally and revert to previously saved values ...
Страница 208: ...208 Figure 4 9 6 QoS Egress Port Tag Remarking Page Screenshot ...
Страница 218: ...218 Deletes the QCE The lowest plus sign adds a new entry at the bottom of the list of QCL ...
Страница 229: ...229 Figure 4 9 18 Voice VLAN Configuration Page Screenshot ...
Страница 252: ...252 Buttons Click to apply changes Click to undo any changes made locally and revert to previously saved values ...
Страница 291: ...291 measurement is 100 ms A value of 0 ms indicates that there hasn t been round trip communication with the server yet ...
Страница 299: ...299 Figure 4 11 17 Add User Properties Screen Figure 4 11 18 Add User Properties Screen ...
Страница 336: ...336 Figure 4 14 2 LLDPMED Configuration Page Screenshot ...
Страница 357: ...357 Figure 4 15 4 VeriPHY Cable Diagnostics Page Screenshot ...
Страница 367: ...367 ...
Страница 375: ...375 Figure 4 16 10 Port Power Consumption Screenshot Buttons Click to refresh the page immediately ...
Страница 391: ...391 ...