How 802.1X port security works

How 802.1X port security works

This section explains the basic concepts behind 802.1X port security, including device roles, how the devices communicate, and the procedure used for authenticating clients.

NOTE

802.1X Port Security cannot be configured on MAC Port Security-enabled ports.

Device roles in an 802.1X configuration

The 802.1X standard defines the roles of Client/Supplicant, Authenticator, and Authentication Server in a network.

The Client (known as a Supplicant in the 802.1X standard) provides username/password information to the Authenticator. The Authenticator sends this information to the Authentication Server. Based on the Client's information, the Authentication Server determines whether the Client can use services provided by the Authenticator. The Authentication Server passes this information to the Authenticator, which then provides services to the Client, based on the authentication result.

Figure 1 illustrates these roles.

FIGURE 1 Authenticator, client/supplicant, and authentication server in an 802.1X configuration

RADIUS Server

(Authentication Server)

Brocade Switch (Authenticator)

Client/Supplicant

Authenticator – The device that controls access to the network. In an 802.1X configuration, the Brocade device serves as the Authenticator. The Authenticator passes messages between the Client and the Authentication Server. Based on the identity information supplied by the Client, and the authentication information supplied by the Authentication Server, the Authenticator either grants or does not grant network access to the Client.

154

Brocade ICX 6650 Security Configuration Guide

 

53-1002601-01

Page 174
Image 174
Brocade Communications Systems 6650 manual How 802.1X port security works, Device roles in an 802.1X configuration