D-Link xStack DGS-3400 Series Reference Manual page 321

Web ui reference guide for layer 2+ managed gigabit ethernet switch
Hide thumbs Also See for xStack DGS-3400 Series:
Table of Contents

Advertisement

x Stack
The following section will explain the three roles of Client, Authenticator, and Authentication Server in greater detail.
Authentication Server
The Authentication Server is a remote device that is connected to the same network as the Client and Authenticator, must be
running a RADIUS Server program and must be configured properly on the Authenticator (Switch). Clients connected to a port on
the Switch must be authenticated by the Authentication Server (RADIUS) before attaining any services offered by the Switch on
the LAN. The role of the Authentication Server is to certify the identity of the Client attempting to access the network by
exchanging secure information between the RADIUS server and the Client through EAPOL packets and, in turn, informs the
Switch whether or not the Client is granted access to the LAN and/or switches services.
Authenticator
The Authenticator (the Switch) is an intermediary between the Authentication Server and the Client. The Authenticator serves two
purposes when utilizing 802.1X. The first purpose is to request certification information from the Client through EAPOL packets,
which is the only information allowed to pass through the Authenticator before access is granted to the Client. The second purpose
of the Authenticator is to verify the information gathered from the Client with the Authentication Server, and to then relay that
information back to the Client.
Three steps must be implemented on the Switch to properly configure the Authenticator.
1.
The 802.1X State must be Enabled. (DGS-3400 Web Management Tool)
2.
The 802.1X settings must be implemented by port (Security / 802.1X / Configure 802.1X Authenticator Parameter)
3.
A RADIUS server must be configured on the Switch. (Security / 802.1X / Authentic RADIUS Server)
®
DGS-3400 Series Layer 2 Gigabit Ethernet M anaged Sw itch
Figure 6 - 16 The three roles of 802.1X
Figure 6 - 17 The Authentication Server
308

Advertisement

Table of Contents
loading

Table of Contents