802.1X Example Configuration - NETGEAR GSM7212P User Manual

Prosafe managed switch
Hide thumbs Also See for GSM7212P:
Table of Contents

Advertisement

is connected can be desirable in order to restrict access to publicly accessible bridge ports or
to restrict access to departmental LANs.
Access control is achieved by enforcing authentication of supplicants that are attached to an
authenticator's controlled ports. The result of the authentication process determines whether
the supplicant is authorized to access services on that controlled port.
A Port Access Entity (PAE) is able to adopt one of two distinct roles within an access control
interaction:
Authenticator: A Port that enforces authentication before allowing access to services
1.
available via that Port.
Supplicant: A Port that attempts to access services offered by the Authenticator.
2.
Additionally, there exists a third role:
Authentication server: Performs the authentication function necessary to check the
3.
credentials of the Supplicant on behalf of the Authenticator.
All three roles are required in order to complete an authentication exchange.
NETGEAR® switches support the Authenticator role only, in which the PAE is responsible for
communicating with the Supplicant. The Authenticator PAE is also responsible for submitting
the information received from the Supplicant to the Authentication Server in order for the
credentials to be checked, which will determine the authorization state of the Port. The
Authenticator PAE controls the authorized/unauthorized state of the controlled Port
depending on the outcome of the RADIUS-based authentication process.
Supplicant
Supplicant

802.1X Example Configuration

This example shows how to configure the switch so that 802.1X-based authentication is
required on the ports in a corporate conference room (1/0/5 - 1/0/8). These ports are
available to visitors and need to be authenticated before granting access to the network. The
authentication is handled by an external RADIUS server. When the visitor is successfully
authenticated, traffic is automatically assigned to the guest VLAN. This example assumes
that a VLAN has been configured with a VLAN ID of 150 and VLAN Name of Guest.
Web Management User Guide
Authenticator
Switch
371
Authentication
Server (RADIUS)
192.168.10.23

Advertisement

Table of Contents
loading

This manual is also suitable for:

Gsm7224pGsm5212pGsm7212f

Table of Contents