Defining | 57 |
Defining | |
Authentication | external server. Only authenticated and approved system users can |
(802.1X) | transmit and receive data. Ports are authenticated via the RADIUS server |
| using the Extensible Authentication Protocol (EAP). |
| authentication includes: |
| ■ Authenticators — Specifies the device port which is authenticated |
| before permitting system access. |
| ■ Supplicants — Specifies the host connected to the authenticated |
| port requesting to access the system services. |
| ■ Authentication Server — Specifies the server that performs the |
| authentication on behalf of the authenticator, and indicates whether |
| the supplicant is authorized to access system services. |
| |
| ■ Controlled Access — Permits communication between the |
| supplicant and the system, if the supplicant is authorized. |
| ■ Uncontrolled Access — Permits uncontrolled communication |
| regardless of the port state. |
This section includes the following topics:
■Viewing 802.1X Authentication
■Defining 802.1X Authentication