Port Authentication Acc. To 802.1X; Description Of Port Authentication According To 802.1X - Hirschmann RS20 User Manual

Hide thumbs Also See for RS20:
Table of Contents

Advertisement

Protection from unauthorized access
6.5 Port authentication acc. to
802.1X
6.5.1 Description of port authentication according
to 802.1X
The port-based network access control is a method described in norm IEEE
802.1X to protect IEEE 802 networks from unauthorized access. The proto-
col controls the access at a port by authenticating and authorizing a device
that is connected to this port of the device.
The authentication and authorization is carried out by the authenticator, in
this case the device. The device authenticates (or does not authenticate) the
supplicant (the querying device, e.g. a PC), which means that it permits the
access to the services it provides (e.g. access to the network to which the
device is connected), or else refuses it. In the process, the device accesses
an external authentication server (RADIUS server), which checks the au-
thentication data of the supplicant. The device exchanges the authentication
data with the supplicant and the server via the Extensible Authentication Pro-
tocol over LANs (EAPOL) and the RADIUS protocol respectively.
RADIUS Server
Figure 24: Radius server connection
88

6.5 Port authentication acc. to 802.1X

Switch/Authenticator
h
h
h
h
Power MICE
802.1X Supplicant
Basic Configuration L2P
Release 4.2 07/08

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents