User’s Manual
251
The advantage of MAC-based authentication over 802.1X is that several clients can be connected to the same port (e.g. through
a 3rd party switch or a hub) and still require individual authentication, and that the clients don't need special supplicant software
to authenticate. The disadvantage is that MAC addresses can be spoofed by malicious users, equipment whose MAC address
is a valid RADIUS user can be used by anyone, and only the MD5-Challenge method is supported.
The 802.1X and MAC-Based Authentication configuration consists of two sections, a system- and a port-wide.
Overview of User Authentication
It is allowed to configure the Industrial Managed Switch to authenticate users logging into the system for management access
using local or remote authentication methods, such as telnet and Web browser. This Industrial Managed Switch provides secure
network management access using the following options:
Remote Authentication Dial-in User Service (RADIUS)
Terminal Access Controller Access Control System Plus ()
Local user name and Privilege Level control
RADIUS and
are logon authentication protocols that use software running on a central server to control access to
RADIUS-aware or TACACS-aware devices on the network. An
authentication server
contains a database of multiple user
name / password pairs with associated privilege levels for each user that requires management access to the Industrial
Managed Switch.
4.11.1 Understanding IEEE 802.1X Port-based Authentication
The IEEE 802.1X standard defines a client-server-based access control and authentication protocol that restricts unauthorized
clients from connecting to a LAN through publicly accessible ports. The authentication server authenticates each client
connected to a switch port before making available any services offered by the switch or the LAN.
Until the client is authenticated, 802.1X access control allows only
Extensible Authentication Protocol over LAN (EAPOL)
traffic through the port to which the client is connected. After authentication is successful, normal traffic can pass through the
port.
This section includes this conceptual information:
•
Device Roles
•
Authentication Initiation and Message Exchange
•
Ports in Authorized and Unauthorized States
Содержание IGS-10020
Страница 1: ...User s Manual...
Страница 31: ...User s Manual 31 IGS 10020PT IGS 10020PT Dimensions W x D x H 72 x 107 x 152mm...
Страница 32: ...User s Manual 32 IGS 10020HPT IGS 10020HPT Dimensions W x D x H 72 x 107 x 152mm...
Страница 33: ...User s Manual 33 IGS 10080MFT IGS 10080MFT Dimensions W x D x H 72 x 107x 152mm...
Страница 34: ...User s Manual 34 IGS 12040MT IGS 12040MT Dimensions W x D x H 72 x 107 x 152mm...
Страница 35: ...User s Manual 35 IGS 20040MT IGS 20040MT Dimensions W x D x H 72 x 107 x 152mm...
Страница 36: ...User s Manual 36 IGS 20160HPT IGS 20160HPT Dimensions W x D x H 84 x 107 x 152mm...
Страница 46: ...User s Manual 46 Figure 2 16 IGS 10080MFT Upper Panel Figure 2 17 IGS 12040MT Upper Panel...
Страница 47: ...User s Manual 47 Figure 2 18 IGS 20040MT Upper Panel Figure 2 19 IGS 20160HPT Upper Panel...
Страница 181: ...User s Manual 181 Figure 4 8 2 Multicast Flooding Figure 4 8 3 IGMP Snooping Multicast Stream Control...