Security: 802.1X Configuration - Lancom GS-2124 User Manual

Hide thumbs Also See for GS-2124:
Table of Contents

Advertisement

LANCOM GS-2124
Chapter 4: Operation of Web- based Management
4.9

Security: 802.1x Configuration

802.1x port-based network access control provides a method to restrict users
to access network resources via authenticating user's information. This rest-
ricts users from gaining access to the network resources through a 802.1x-
enabled port without authentication. If a user wishes to touch the network
through a port under 802.1x control, he (she) must firstly input his (her)
account name for authentication and waits for gaining authorization before
sending or receiving any packets from a 802.1x-enabled port.
Before the devices or end stations can access the network resources through
the ports under 802.1x control, the devices or end stations connected to a
controlled port send the authentication request to the authenticator, the
authenticator pass the request to the authentication server to authenticate
and verify, and the server tell the authenticator if the request get the grant of
authorization for the ports.
According to IEEE802.1x, there are three components implemented. They are
Authenticator, Supplicant and Authentication server.
94
Supplicant:
It is an entity being authenticated by an authenticator. It is used to com-
municate with the Authenticator PAE (Port Access Entity) by exchanging
the authentication message when the Authenticator PAE request to it.
Authenticator:
An entity facilitates the authentication of the supplicant entity. It controls
the state of the port, authorized or unauthorized, according to the result
of authentication message exchanged between it and a supplicant PAE.
The authenticator may request the supplicant to re-authenticate itself at

Advertisement

Table of Contents
loading

Table of Contents