Axis Communications 233D user manual Authentication process, Radius

Models: 233D

1 81
Download 81 pages 50.8 Kb
Page 44
Image 44

44AXIS 233D - System Options

Clients and servers in an 802.1X network may need to authenticate each other by some means. In the Axis implementation this is done with the help of digital certificates provided by a Certification Authority (CA). These are then validated by a third-party entity, such as a RADIUS server, examples of which are Free Radius and Microsoft Internet Authentication Service.

To perform the authentication, the RADIUS server uses various EAP methods/protocols, of which there are many. The one used in the Axis implementation is EAP-TLS (EAP-Transport Layer Security).

The AXIS network video device presents its certificate to the network switch, which in turn forwards this to the RADIUS server. The RADIUS server validates or rejects the certificate and responds to the switch, and sends its own certificate to the client for validation. The switch then allows or denies network access accordingly, on a pre-configured port.

The authentication process

 

 

Axis video device

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Certificate

3

Q: Certificate OK?

 

 

 

A: OK

Network

Q: Certificate OK?

A: OK

switch

 

4

 

 

1

 

 

 

 

 

 

 

 

Certificate

 

 

 

 

 

 

 

 

 

 

Authority (CA)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

RADIUS

 

 

 

 

 

server

 

 

 

 

Certificate

 

 

 

 

 

 

 

 

 

Protected network

1.A CA server provides the required signed certificates.

2.The Axis video device requests access to the protected network at the network switch. The switch forwards the video device’s CA certificate to the RADIUS server, which then replies to the switch.

3.The switch forwards the RADIUS server’s CA certificate to the video device, which also replies to the switch.

Page 44
Image 44
Axis Communications 233D user manual Authentication process, Radius