802.1x Network Access Control

Port-based network access control allows the operation of a system’s port(s) to be controlled to ensure that access to its services is permitted only by systems that are authorized to do so.

Port Access Control provides a means of preventing unauthorized access by supplicants or users to the services offered by a system. Control over the access to a switch and the LAN to which it is connected can be desirable in order to restrict access to publicly accessible bridge ports or departmental LANs.

The PowerConnect 6200 Series switch achieves access control by enforcing authentication of supplicants that are attached to an authenticator’s controlled ports. The result of the authentication process determines whether the supplicant is authorized to access services on that controlled port.

A PAE (Port Access Entity) can adopt one of two roles within an access control interaction:

Authenticator – Port that enforces authentication before allowing access to services available via that Port.

Supplicant – Port that attempts to access services offered by the Authenticator.

Additionally, there exists a third role:

Authentication server – Server that performs the authentication function necessary to check the credentials of the supplicant on behalf of the Authenticator.

Completion of an authentication exchange requires all three roles. The PowerConnect 6200 Series switch supports the authenticator role only, in which the PAE is responsible for communicating with the supplicant. The authenticator PAE is also responsible for submitting information received from the supplicant to the authentication server in order for the credentials to be checked, which determines the authorization state of the port. Depending on the outcome of the authentication process, the authenticator PAE then controls the authorized/unauthorized state of the controlled Port.

Authentication is accomplished via an external authentication server:

Remote Authentication Dial-In User Service (RADIUS)

Terminal Access Controller Access Control System (TACACS+)

802.1x Network Access Control Examples

This section contains examples of the CLI commands used to configure 802.1X.

Example #1: Configure RADIUS Server for Authentication

This example configures a single RADIUS server used for authentication at 10.10.10.10. The shared secret is configured to be secret. The process creates a new authentication list, called radiusList, which uses RADIUS as the authentication method. This authentication list is associated with the 802.1x default login. 802.1x port based access control is enabled for the system, and interface 1/g1 is configured to be in force-authorized mode because this is where the RADIUS server and protected network resources are located.

106

Device Security

Page 106
Image 106
Dell 6200 SERIES 802.1x Network Access Control Examples, Example #1 Configure Radius Server for Authentication, 106

6200 SERIES specifications

The Dell 6200 Series is a notable line of workstations designed for professionals seeking powerful computing solutions in fields such as engineering, architecture, and design. With its robust architecture and advanced technology, this series stands out for its ability to handle demanding applications while offering reliability and performance.

One of the key features of the Dell 6200 Series is its powerful processing capabilities. It typically includes Intel Xeon processors, which provide multiple cores to manage multitasking efficiently. This allows users to run complex simulations or render high-resolution graphics without experiencing lag or slowdown. The processors are designed for optimal thermal management, allowing for sustained performance during extended work sessions.

Another significant aspect of the Dell 6200 Series is its graphics capabilities. These workstations often come equipped with NVIDIA or AMD professional-grade graphics cards, ensuring that they are equipped to handle graphically intensive tasks, such as 3D modeling and video editing. The support for advanced rendering technologies allows professionals to work with high-fidelity visuals and complex datasets with ease.

In terms of expandability, the Dell 6200 Series is designed with flexibility in mind. Users can customize their workstations with a range of configurations, including varied RAM capacities and storage options. This flexibility ensures that the workstation can be tailored to meet the specific requirements of different workloads. The incorporation of Solid State Drives (SSDs) enhances data access speeds, significantly improving boot times and overall system responsiveness.

Additionally, the Dell 6200 Series includes comprehensive connectivity options to facilitate integration with various peripherals and networks. With multiple USB ports, Ethernet ports, and support for multiple display outputs, users can connect to external devices easily, promoting an efficient workflow.

Security features are also a priority in this series. The workstations typically include advanced security measures, such as TPM (Trusted Platform Module) technology, which helps protect sensitive data through hardware encryption and secure storage.

Overall, the Dell 6200 Series delivers a blend of power, flexibility, and security that makes it an excellent choice for professionals in need of a dependable workstation. With its advanced technologies and ample expansion options, users can feel confident that their equipment can handle both current and future demands, making it a smart investment for any professional environment.