Overview of User Authentication
It is allowed to configure the Industrial Managed Switch to authenticate users logging into the system for management
access using local or remote authentication methods, such as telnet and Web browser. This Industrial Managed Switch
provides secure network management access using the following options:
Remote Authentication Dial-in User Service (RADIUS)
Terminal Access Controller Access Control System Plus (TACACS+)
Local user name and Privilege Level control
RADIUS and TACACS+ are logon authentication protocols that use software running on a central server to control access to
RADIUS-aware or TACACS-aware devices on the network. An authentication server contains a database of multiple user
name / password pairs with associated privilege levels for each user that requires management access to the Industrial
Managed Switch.
Understanding IEEE 802.1X Port-based Authentication
The IEEE 802.1X standard defines a client-server-based access control and authentication protocol that restricts unauthorized
clients from connecting to a LAN through publicly accessible ports. The authentication server authenticates each client
connected to a switch port before making available any services offered by the switch or the LAN.
Until the client is authenticated, 802.1X access control allows only Extensible Authentication Protocol over LAN (EAPOL)
traffic through the port to which the client is connected. After authentication is successful, normal traffic can pass through the
port.
This section includes this conceptual information:
Device Roles
Authentication Initiation and Message Exchange
Ports in Authorized and Unauthorized States
User's Manual of WGS-5225-8P2S Series
314