
Chapter 85 Port Authentication
XS3800-28 User’s Guide
642
C
HAPTER
85
Port Authentication
85.1 Port Authentication Overview
This chapter describes the IEEE 802.1x, MAC, Guest VLAN, and Compound authentication methods.
Port authentication is a way to validate access to ports on the Switch to clients based on an external
authentication server. The Switch supports the following methods for port authentication:
•
IEEE 802.1x
2
– An authentication server validates access to a port based on a user name and
password provided by the user. A user that fails an authentication server can still access the port, but
traffic from the user is forwarded to the guest VLAN port.
•
MAC Authentication
– An authentication server validates access to a port based on the MAC address
and password of the client.
•
Guest VLAN
– In either mode, if authentication fails the Switch can still allow the client to access the
network on a
Guest VLAN
.
•
Compound Authentication
– An authentication server validates access to a port based on
combination of IEEE 802.1x and MAC Authentication. There are two modes:
•
Loose
: The client authenticates using either IEEE 802.1x authentication or MAC Authentication.
•
Strict
: The client authenticates using both IEEE 802.1x authentication and MAC Authentication.
Note: All types of authentication use the RADIUS (Remote Authentication Dial In User Service,
RFC 2138, 2139) protocol to validate users. You must configure a RADIUS server before
enabling port authentication.
Note: If you enable IEEE 802.1x authentication and MAC authentication on the same port, the
Switch performs IEEE 802.1x authentication and MAC authentication. If a user fails to
authenticate either through the IEEE 802.1x or MAC authentication method, then
access to the port is denied.
Note: IEEE 802.1x is not supported by all user operating systems. For details on compatibility,
see your operating system documentation. If your operating system does not support
802.1x, you must install 802.1x client software.
85.1.1 What You Can Do
• Use the
802.1x
screen (
) to activate IEEE 802.1x security.
• Use the
MAC Authentication
) to activate MAC authentication.
• Use the
Guest VLAN
) to enable and assign a guest VLAN to a port.
2.
At the time of writing, IEEE 802.1x is not supported by all operating systems. See your operating system
documentation. If your operating system does not support 802.1x, then you may need to install 802.1x client
software.
Содержание XS3800-28
Страница 29: ...29 PART I User s Guide...
Страница 54: ...54 PART II Technical Reference...
Страница 88: ...Chapter 4 Web Configurator XS3800 28 User s Guide 88 Figure 51 Online Web Help...
Страница 123: ...Chapter 13 Neighbor XS3800 28 User s Guide 123 Figure 77 MONITOR Neighbor Neighbor Details Standalone Mode...
Страница 139: ...Chapter 17 System Information XS3800 28 User s Guide 139 Figure 90 MONITOR System Information Standalone Mode...
Страница 148: ...Chapter 20 Cloud Management XS3800 28 User s Guide 148 Figure 94 SYSTEM Cloud Management...
Страница 221: ...Chapter 33 Green Ethernet XS3800 28 User s Guide 221 Figure 149 PORT Green Ethernet Standalone Mode...
Страница 263: ...Chapter 36 OAM XS3800 28 User s Guide 263 Figure 182 PORT OAM OAM Status OAM Details...
Страница 334: ...Chapter 44 Multicast XS3800 28 User s Guide 334 Figure 248 MVR Group Configuration Example View...
Страница 406: ...Chapter 54 Spanning Tree Protocol XS3800 28 User s Guide 406 Figure 302 MSTP and Legacy RSTP Network Example...
Страница 420: ...Chapter 57 VLAN XS3800 28 User s Guide 420 Figure 315 SWITHCING VLAN VLAN Setup Static VLAN Add Edit Standalone Mode...
Страница 439: ...Chapter 57 VLAN XS3800 28 User s Guide 439 Figure 336 SWITCHING VLAN Port Based VLAN Setup Port Isolation...
Страница 540: ...Chapter 72 VRRP XS3800 28 User s Guide 540 Figure 434 VRRP Example 2 VRRP Status on Switch B...
Страница 581: ...Chapter 77 Policy Rule XS3800 28 User s Guide 581 Figure 456 Policy Example...
Страница 658: ...Chapter 86 Port Security XS3800 28 User s Guide 658 Figure 521 SECURITY Port Security Standalone Mode...
Страница 678: ...Chapter 87 MAINTENANCE XS3800 28 User s Guide 678 Figure 542 MAINTENANCE Configuration Configure Clone Stacking Mode...
Страница 680: ...Chapter 87 MAINTENANCE XS3800 28 User s Guide 680 Figure 543 MAINTENANCE Diagnostic Standalone Mode...
Страница 684: ...Chapter 87 MAINTENANCE XS3800 28 User s Guide 684 Figure 545 MAINTENANCE Firmware Upgrade Standalone Mode...
Страница 747: ...747 PART III Troubleshooting and Appendices...