Client; Authentication Process; Port-Based Network Access Control - D-Link DGS-3024 Manual

Managed 24-port gigabit ethernet switch
Hide thumbs Also See for DGS-3024:
Table of Contents

Advertisement

DGS-3024 Gigabit Ethernet Switch Manual

Client

The Client is simply the workstation that wishes to gain access to the LAN or Switch services. All workstation must be
running software that is compliant with the 802.1x protocol. For users running Windows XP, the software is included
within the operating system. All other users are required to attain 802.1x client software from an outside source. The Client
will request access to the LAN and or Switch through EAPOL packets and, in turn will respond to requests from the Switch.
Figure 7- 52. Client

Authentication Process

Utilizing the three components stated above, the 802.1x protocol provides a stable and secure way of authorizing and
authenticating users attempting to access the network. Only EAPOL traffic is allowed to pass through the specified port
before a successful authentication is made. This port is "locked" until the point when a Client with the correct username and
password is granted access and therefore successfully "unlocks" the port. Once unlocked, normal traffic is allowed to pass
through the port. The implementation of 802.1x allows network administrators to choose Port-Based Access Control. This
method requires only one user to be authenticated per port by a remote RADIUS server to allow the remaining users on the
same port access to the network.

Port-Based Network Access Control

The original intent behind the development of 802.1x was to leverage the characteristics of point-to-point in LANs. Any
single LAN segment in such an infrastructures has no more than two devices attached to it, one of which is a Bridge Port.
The Bridge Port detects events that indicate the attachment of an active device at the remote end of the link, or an active
device becoming inactive. These events can be used to control the authorization state of the Port and initiate the process of
authenticating the attached device if the Port is unauthorized. This is the Port-Based Network Access Control.
75

Advertisement

Table of Contents
loading

Table of Contents