D-Link DES-3010FA/GA manual Configuring Network Security, Network Security Overview

Models: DES-3010FA/GA

1 281
Download 281 pages 550 b
Page 84
Image 84

Configuring Device Security

Configuring Network Security

Configuring Network Security

Network security manages both access control lists and locked ports. This section contains the following topics:

Network Security Overview

Defining Network Authentication Properties

Defining Port Authentication

Configuring Traffic Control

Network Security Overview

This section provides an overview of network security and contains the following topics:

Port-Based Authentication

Advanced Port-Based Authentication

Port-Based Authentication

Port-based authentication authenticates users on a per-port basis via an external server. Only authenticated and approved system users can transmit and receive data. Ports are authenticated via the RADIUS server using the Extensible Authentication Protocol (EAP). Port-based authentication includes:

Authenticators — Specifies the device port which is authenticated before permitting system access.

Supplicants — Specifies the host connected to the authenticated port requesting to access the system ser- vices.

Authentication Server — Specifies the server that performs the authentication on behalf of the authentica- tor, and indicates whether the supplicant is authorized to access system services.

Port-based authentication creates two access states:

Controlled Access — Permits communication between the supplicant and the system, if the supplicant is authorized.

Uncontrolled Access — Permits uncontrolled communication regardless of the port state.

The device currently supports port-based authentication via RADIUS servers.

Advanced Port-Based Authentication

Advanced port-based authentication enables multiple hosts to be attached to a single port. Advanced port-based authentication requires only one host to be authorized for all hosts to have system access. If the port is unautho- rized, all attached hosts are denied access to the network.

Advanced port-based authentication also enables user-based authentication. Specific VLANs in the device are always available, even if specific ports attached to the VLAN are unauthorized. For example, Voice over IP does not require authentication, while data traffic requires authentication. VLANs for which authorization is not required can be defined. Unauthenticated VLANs are available to users, even if the ports attached to the VLAN are defined as authorized.

Advanced port-based authentication is implemented in the following modes:

Single Host Mode — Only the authorized host can access the port.

Multiple Host Mode — Multiple hosts can be attached to a single port. Only one host must be authorized for all hosts to access the network. If the host authentication fails, or an EAPOL-logoff message is received, all attached clients are denied access to the network.

Page 83

Page 84
Image 84
D-Link DES-3010FA/GA manual Configuring Network Security, Network Security Overview, Port-Based Authentication