Understanding Authentication On J-Ex Series Switches - Dell PowerConnect J-EX4200-24T Software Manual

J series; j-ex series
Table of Contents

Advertisement

Dell PowerConnect J-Series Ethernet Switch Complete Software Guide for Junos OS

Understanding Authentication on J-EX Series Switches

A Basic Authentication Topology
2248
You can control access to your network through a J-EX Series Switch using several
different authentication methods—802.1X, MAC RADIUS, or captive portal. Authentication
prevents unauthorized devices and users from gaining access to your LAN. For 802.1X
and MAC RADIUS authentication, end devices must be authenticated before they receive
an IP address from a DHCP server. For captive portal authentication, the switch allows
the devices to get an IP address, and allows DHCP, DNS and ARP packets.
You can allow end devices to access the network without authentication by including
the MAC address of the end device in the static MAC bypass list or, for captive portal, by
including the MAC address of the end device in the authentication whitelist.
You can configure 802.1X, MAC RADIUS, and captive portal on the same interface and
in any combination, except that you cannot configure MAC RADIUS and captive portal
on an interface without also configuring 802.1X. If you configure multiple authentication
methods on a single interface, the switch falls back to another method if the first method
is unsuccessful. For a description of the process flow when multiple authentication
methods are configured on an interface, see "Authentication Process Flow for EX Series
Switches" on page 2255.
This topic covers:
A Basic Authentication Topology on page 2248
802.1X Authentication on page 2250
MAC RADIUS Authentication on page 2250
Captive Portal Authentication on page 2251
Static MAC Bypass of Authentication on page 2252
Fallback of Authentication Methods on page 2252
Figure 45 on page 2249 illustrates a basic deployment topology for authentication on a
J-EX Series switch:

Advertisement

Table of Contents
loading

Table of Contents