Chapter 47 802.1X Configuration; Introduction To 802.1X; The Authentication Structure Of 802.1X - Planet XGS3-42000R User Manual

4-slot layer 3 ipv6/ ipv4 routing chassis switch
Table of Contents

Advertisement

47.1 Introduction to 802.1x

The 802.1x protocol originates from 802.11 protocol, the wireless LAN protocol of IEEE, which is designed to
provide a solution to doing authentication when users access a wireless LAN. The LAN defined in IEEE 802
LAN protocol does not provide access authentication, which means as long as the users can access a LAN
controlling device (s uch as a LA N Switch), they will be able to get all the devices or resources in the LAN.
There was no looming danger in the environment of LAN in those primary enterprise networks.
However, along with the boom of applications like mobile office and service operating networks, the service
providers should control and configure the access from user. The prevailing application of WLA N and LA N
access in telecommunication networks, in particular, make it necessary to control ports in order to implement
the user-level access control. And as a result, IEEE LAN/WAN committee defined a standard, which is 802.1x,
to do Port-B ased Network Access Control. This standard has been widely used in wireless LAN and et hernet.
"Port-B ased Network Access Control" means to authenticate and cont rol the user devices on the level of ports
of LA N access devices. Only when the user devices connected to the ports pass the aut hentication, can they
access the resources in the LAN, otherwis e, the resources in the LA N won't be available.

47.1.1 The Authentication Structure of 802.1x

The system using 802.1x has a typical Client/Server structure, which contains three entities (as illustrated in
the next figure): Supplicant system, Authenticator system, and Authentication server system.
The supplicant system is an entity on one end of the LAN segment, should be authenticated by the
access controlling unit on the other end of the link. A Supplicant system usually is a user terminal
devic e. Users start 802. 1x authentication by starting supplicant system software. A supplicant
system should support EAPOL (Extensible Authentication Protocol over LAN).

Chapter 47 802.1x Configuration

Figure 47-1-1 The A uthentication Structure of 802.1x
47-1

Advertisement

Table of Contents

Troubleshooting

loading

Table of Contents