
Access Control Concepts
Network Access Control Technologies
802.1X
The 
802.1X binds the state of a user’s port (open or closed) to the user’s authenti- cation 
Process. An endpoint follows this process to connect to a network that enforces 802.1X authentication:
1.The endpoint, which is running an 802.1X supplicant, establishes a Data- Link Layer connection to the PEP:
•An Ethernet cable is plugged into a switch and the link opens.
•A wireless endpoint associates with a wireless AP.
| N o t e | The 802.1X supplicant is usually running on an endpoint, as described in these | 
| 
 | steps. However, network infrastructure devices can also have supplicants, | 
| 
 | enabling them to authenticate to the network. For example, you might impose | 
| 
 | 802.1X authentication on all switch ports, even those to which APs connect. | 
| 
 | You would then configure the 802.1X supplicants on legitimate APs so that | 
| 
 | they could authenticate to the network and be granted access. Rogue APs, on | 
| 
 | the other hand, would be denied access. | 
| 
 | 2. The PEP shuts down the connection to all traffic except EAP authentica- | 
| 
 | |
| 
 | tion messages. It sends an EAP challenge to the endpoint’s 802.1X suppli- | 
| 
 | cant. | 
| 
 | 3. An 802.1X supplicant returns an EAP message that typically contains its | 
| 
 | username. The PEP proxies the supplicant’s response to the authentica- | 
| 
 | tion server and the server’s reply back to the supplicant, thereby creating | 
| 
 | a logical connection between the supplicant and the authentication server. | 
| 
 | 4. Within this logical data tunnel, the supplicant and the authentication | 
| 
 | server exchange authentication information. The exact process, as well | 
| 
 | as the type of credentials exchanged and the security of the tunnel, | 
| 
 | depends on the EAP method, which you will learn about later. | 
| 
 | 5. The authentication server verifies the user’s credentials against its own | 
| 
 | or a centrally managed data store. The authentication server may also | 
| 
 | retrieve policy information, such as rules for the times the user is allowed | 
| 
 | on the network or rules specifying authorization instructions (for exam- | 
| 
 | ple, a VLAN assignment). | 
