D-Link DGS-3100 user manual Configuring Port Authentication, Description

Models: DGS-3100

1 209
Download 209 pages 46.85 Kb
Page 111
Image 111
Configuring Port Authentication 802.1X

DGS-3100 Series Gigabit Stackable Managed Switch User Manual

Configuring Port Authentication 802.1X

Port-based authentication authenticates users on a per-port/per mac basis via an external server. Only authenticated and approved system users can transmit and receive data. Ports are authenticated via the RADIUS server using the Extensible Authentication Protocol (EAP). The 802.1x Access Control protocol consists of the following vital components which stabilize Access Control Security:

Component

Authenticators

Supplicants/Clients

Authentication Server

Description

The Authenticator is an intermediary between the Authentication Server and the Client. The authenticator:

Requests certification information via the Client (EAPOL packets). The EAPOL packets are the only information allowed to pass between supplicants and the authentication server until the authenticator is granted system access.

Verifies the information gathered from the Client with the Authentication Server, and relays the information to the Client.

Specifies the host connected to the authenticated port requesting to access the system services.

Specifies the server that performs the authentication on behalf of the authenticator, and indicates whether the supplicant is authorized to access system services. The Authentication Server is a remote device connected to the Client network and Authenticator. The Authentication Server must have RADIUS Server application enabled and configured. Clients connected to a port on the Switch must be authenticated by the Authentication Server before accessing any system services. The Authentication Server certifies the client’s identity attempting to access the network by exchanging secure information between the RADIUS server and the Client.

Port-based authentication creates two access states:

State

Controlled Access

Uncontrolled Access

Description

Permits communication between the supplicant and the system, if the supplicant is authorized.

Permits uncontrolled communication regardless of the port state.

99

Page 111
Image 111
D-Link DGS-3100 Configuring Port Authentication, Component Authenticators Supplicants/Clients Authentication Server