Black Box 12-Port 1000BASE-TX L2 Managed PoE Switch User Manual page 80

With 2 sfpdual media ports
Table of Contents

Advertisement

CHAPTER 4: Web-Based Management
A port acting as an authenticator is thought to be two logical ports, a controlled port and an uncontrolled port.
A controlled port can only pass the packets when the authenticator PAE is authorized, and otherwise, an
uncontrolled port will unconditionally pass the packets with PAE group MAC address, which has the value of
01-80-c2-00-00-03 and will not be forwarded by MAC bridge, at any time.
Authentication server:
A device provides authentication service, through EAP, to an authenticator by using authentication credentials
supplied by the supplicant to determine if the supplicant is authorized to access the network resource.
The overview of operation flow for the Fig. 4-1 is quite simple. When Supplicant PAE issues a request to
Authenticator PAE, Authenticator and Supplicant exchanges authentication message. Then, Authenticator
passes the request to RADIUS server to verify. Finally, RADIUS server replies if the request is granted or denied.
While in the authentication process, the message packets, encapsulated by Extensible Authentication Protocol
over LAN (EAPOL), are exchanged between an authenticator PAE and a supplicant PAE. The Authenticator
exchanges the message to authentication server using EAP encapsulation. Before successfully authenticating,
the supplicant can only touch the authenticator to perform authentication message exchange or access the
network from the uncontrolled port.
Authentication
Supplicant's
Authenticator's System
Server's System
System
Supplicant
Services Offered
PAE
by Authenticator
Authenticator
Authentication
(e.g Bridge Relay)
PAE
Server
Controlled port
Uncontrolled port
Port Authorize
MAC Enable
LAN
Figure 4-1.
In the Fig. 4-2, this is the typical configuration, a single supplicant, an authenticator and an authentication
server. B and C is in the internal network, D is Authentication server running RADIUS, switch at the central
location acts Authenticator connecting to PC A and A is a PC outside the controlled port, running Supplicant
PAE. In this case, PC A wants to access the services on device B and C, first, it must exchange the authentication
message with the authenticator on the port it connected via EAPOL packet. The authenticator transfers the
supplicant's credentials to Authentication server for verification. If success, the authentication server will notice
the authenticator the grant. PC A, then, is allowed to access B and C via the switch. If there are two switches
directly connected together instead of single one, for the link connecting two switches, it may have to act two
port roles at the end of the link: authenticator and supplicant, because the traffic is bi-directional.
77

Advertisement

Table of Contents
loading

Table of Contents