1.On the initial stage, the supplicant A is unauthenticated and a port on switch acting as an authenticator is in unauthorized state. So the access is blocked in this stage.

2.Initiating a session. Either authenticator or supplicant can initiate the message exchange. If supplicant initiates the process, it sends EAPOL-start packet to the authenticator PAE and authenticator will immediately respond EAP-Request/Identity packet.

3.The authenticator always periodically sends EAP-Request/Identity to the supplicant for requesting the identity it wants to be authenticated.

4.If the authenticator doesn’t send EAP-Request/Identity, the supplicant will initiate EAPOL-Start the process by sending to the authenticator.

5.And next, the Supplicant replies an EAP-Response/Identity to the authenticator. The authenticator will embed the user ID into Radius- Access-Request command and send it to the authentication server for confirming its identity.

6.After receiving the Radius-Access-Request, the authentication server sends Radius-Access-Challenge to the supplicant and asks or user password via the authenticator PAE.

7.The supplicant will convert user password into the credential information, perhaps, in MD5 format and replies an EAP-Response with this credential information as well as the specified authentication algorithm (MD5 or OTP) to Authentication server via the authenticator PAE. As per the value of the type field in message PDU, the authentication server knows which algorithm should be applied to authenticate the credential information, EAP-MD5 (Message Digest 5) or EAP-OTP (One Time Password) or other else algorithm.

8.If the user ID and password is correct, the authentication server will send a Radius-Access-Accept to the authenticator. If not correct, the authentication server will send a Radius-Access-Reject.

9.When the authenticator PAE receives a Radius-Access-Accept, it will send an EAP-Success to the supplicant. At this time, the supplicant is authorized and the port connected to the supplicant and under 802.1x control is in the authorized state. The supplicant and other devices connected to this port can access the network. If the authenticator receives a Radius-Access-Reject, it will send an EAP-Failure to the supplicant. This means the supplicant is failed to authenticate. The port it connects is in the unauthorized state, the supplicant and the devices connected to this port won’t be allowed to access the network.

64

Page 70
Image 70
Edimax Technology ES-5240G+ user manual

ES-5240G+ specifications

Edimax Technology ES-5240G+ is a highly versatile and efficient Ethernet switch designed to cater to the networking needs of small to medium-sized businesses and home offices. With its robust features and reliable performance, this switch is an essential component for a seamless network infrastructure.

One of the standout features of the ES-5240G+ is its 24 10/100/1000Mbps Gigabit Ethernet ports. This allows for high-speed connectivity, enabling users to transfer large files quickly and efficiently. The switch is equipped with a non-blocking architecture, ensuring that all ports can be utilized simultaneously without any reduction in bandwidth. This is particularly beneficial for businesses that rely on high-speed internet and internal networks for their daily operations.

The ES-5240G+ supports advanced Layer 2 switching features, including VLAN (Virtual Local Area Network) support, port mirroring, and link aggregation. These features enhance network management and optimization, making it easier to segment network traffic and improve security. With VLAN support, users can create separate networks within the same switch, leading to improved performance and reduced broadcast traffic.

Moreover, the ES-5240G+ incorporates IEEE 802.3x Flow Control, which helps to prevent data loss during heavy traffic periods. This technology allows for effective communication between devices and ensures smooth data transmission, even in congested network environments. Additionally, the switch is equipped with Automatic MDI/MDI-X detection, eliminating the need for crossover cables and simplifying installation.

From a security perspective, Edimax has included features such as address filtering and port security, which help to protect the network from unauthorized access. The switch can restrict access to specific MAC addresses, providing an added layer of security for sensitive data.

In terms of energy efficiency, the ES-5240G+ is designed to comply with IEEE 802.3az Energy Efficient Ethernet standards. This technology helps to reduce power consumption during low-traffic periods, making it an eco-friendly choice for businesses looking to minimize their carbon footprint.

Overall, Edimax Technology ES-5240G+ stands out as a reliable and efficient Ethernet switch, equipped with a range of features that enhance network performance and security. Its capabilities make it an ideal choice for businesses seeking to streamline their networking infrastructure and improve operational efficiency.