D-Link DXS-3600 Series Reference Manual page 481

Layer 2/3 managed 10gigabut ethernet switch
Hide thumbs Also See for DXS-3600 Series:
Table of Contents

Advertisement

DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
XP and windows Vista, that software is included within the operating system. All other users are required
to attain 802.1X client software from an outside source. The Client will request access to the LAN and or
Switch through EAPOL packets and, in turn will respond to requests from the Switch.
Authentication Process
Utilizing the three roles stated above, the 802.1X protocol provides a stable and secure way of
authorizing and authenticating users attempting to access the network. Only EAPOL traffic is allowed to
pass through the specified port before a successful authentication is made. This port is "locked" until the
point when a Client with the correct username and password (and MAC address if 802.1X is enabled by
MAC address) is granted access and therefore successfully "unlocks" the port. Once the port is unlocked,
normal traffic is allowed to pass through the port. The following figure displays a more detailed
explanation of how the authentication process is completed between the three roles stated above.
The D-Link implementation of 802.1X allows network administrators to choose between two types of
Access Control used on the Switch, which are:
Figure 9-8 The Client
Figure 9-9 The 802.1X Authentication Process
470

Advertisement

Table of Contents
loading

Table of Contents