Authentication Process - Hirschmann MS30, Power MICE, MACH 4000, OCTOPUS User Manual

Industrial ethernet gigabit switch
Hide thumbs Also See for MS30, Power MICE, MACH 4000, OCTOPUS:
Table of Contents

Advertisement

Protection from unauthorized access

6.5.2 Authentication process

A supplicant tries to communicate via a Switch port.
D
The Switch requests authentication from the supplicant. At that time only
EAPOL traffic is permitted between the supplicant and the Switch.
D
The supplicant replies his identification data.
D
The Switch forwards the identication data to the authentication server.
D
The authentication server replies concerning the autherization.
D
The Switch evaluates the reply and allows access to the supplicant at this
port (or leaves the port in the blocked state).
6.5.3 Preparing the switch for the 802.1X
port authentication
V Configure your own IP parameters (for the Switch).
V Globally Switch on the function of the 802.1X port authentication.
V Set the 802.1X port control to "auto". The default setting is
"force-authorized".
V Enter the "shared secret" between the Authenticator and the Radius
server. The shared secret is a text string specified by the Radius server
administrator.
V Enter the IP address and the port of the Radius server. The default UDP
port of the Radius server is the port 1812.
Layer 2 Enhanced with Layer 2 Professional
Release 1.0 10/05
6.5 Port Authentication according to 802.1X
83

Advertisement

Table of Contents
loading

This manual is also suitable for:

Rs30, ms20Rs20

Table of Contents