Configuring
General 802.1X Authenticator Operation
General 802.1X Authenticator OperationThis operation provides security on a direct,
Example of the Authentication Process
Suppose that you have configured a port on the switch for 802.1X authentication operation. If you then connect an
1.When the switch detects the client on the port, it blocks access to the LAN from that port.
2.The switch responds with an identity request.
3.The client responds with a user name that uniquely defines this request for the client.
4.The switch responds in one of the following ways:
•If 802.1X
i.The server responds with an access challenge which the switch forwards to the client.
ii.The client then provides identifying credentials (such as a user certificate), which the switch forwards to the RADIUS server.
iii.The RADIUS server then checks the credentials provided by the client.
iv.If the client is successfully authenticated and authorized to con- nect to the network, then the server notifies the switch to allow access to the client. Otherwise, access is denied and the port remains blocked.
•If 802.1X
i.The switch compares the client’s credentials with the username and password configured in the switch (Operator or Manager level).