Port Authentication Ieee 802.1X; Description Of Port Authentication According To - Hirschmann RS20 User Manual

Hide thumbs Also See for RS20:
Table of Contents

Advertisement

Protection from Unauthorized Access
6.6 Port Authentication
IEEE 802.1X
6.6.1
Description of Port Authentication
according to IEEE 802.1X
The port-based network access control is a method described in the standard
IEEE 802.1X to protect IEEE 802 networks from unauthorized access. The
protocol controls the access to a port by authenticating and authorizing a
device that is connected to this port of the device.
The authentication and authorization is performed by the authenticator, in
this case the device. The device authenticates (or does not authenticate) the
supplicant (the querying device, e.g. a PC), which means that it permits the
access to the services it provides (e.g. access to the network to which the
device is connected), or else refuses it. In the process, the device accesses
an external authentication server (RADIUS server), which checks the
authentication data of the supplicant. The device exchanges the
authentication data with the supplicant via the Extensible Authentication
Protocol over LANs (EAPOL), and with the RADIUS server via the RADIUS
protocol.
RADIUS Server
Figure 24: Radius server connection
94

6.6 Port Authentication IEEE 802.1X

Switch/Authenticator
802.1X Supplicant
Basic Configuration
Release 6.0 07/2010

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents