DGS-3024 Gigabit Ethernet Switch Manual

Client

The Client is simply the workstation that wishes to gain access to the LAN or Switch services. All workstation must be running software that is compliant with the 802.1x protocol. For users running Windows XP, the software is included within the operating system. All other users are required to attain 802.1x client software from an outside source. The Client will request access to the LAN and or Switch through EAPOL packets and, in turn will respond to requests from the Switch.

Figure 7- 52. Client

Authentication Process

Utilizing the three components stated above, the 802.1x protocol provides a stable and secure way of authorizing and authenticating users attempting to access the network. Only EAPOL traffic is allowed to pass through the specified port before a successful authentication is made. This port is “locked” until the point when a Client with the correct username and password is granted access and therefore successfully “unlocks” the port. Once unlocked, normal traffic is allowed to pass through the port. The implementation of 802.1x allows network administrators to choose Port-Based Access Control. This method requires only one user to be authenticated per port by a remote RADIUS server to allow the remaining users on the same port access to the network.

Port-Based Network Access Control

The original intent behind the development of 802.1x was to leverage the characteristics of point-to-point in LANs. Any single LAN segment in such an infrastructures has no more than two devices attached to it, one of which is a Bridge Port. The Bridge Port detects events that indicate the attachment of an active device at the remote end of the link, or an active device becoming inactive. These events can be used to control the authorization state of the Port and initiate the process of authenticating the attached device if the Port is unauthorized. This is the Port-Based Network Access Control.

76

Page 90
Image 90
D-Link DSL-G604T manual Client, Authentication Process, Port-Based Network Access Control