GS-2124C User Manual

3-15. 802.1x Configuration

802.1x port-based network access control provides a method to restrict users to access network resources via authenticating user’s information. This restricts users from gaining access to the network resources through a 802.1x-enabled port without authentication. If a user wishes to touch the network through a port under 802.1x control, he (she) must firstly input his (her) account name for authentication and waits for gaining authorization before sending or receiving any packets from a 802.1x-enabled port.

Before the devices or end stations can access the network resources through the ports under 802.1x control, the devices or end stations connected to a controlled port send the authentication request to the authenticator, the authenticator pass the request to the authentication server to authenticate and verify, and the server tell the authenticator if the request get the grant of authorization for the ports.

According to IEEE802.1x, there are three components implemented. They are Authenticator, Supplicant and Authentication server shown in Fig. 3-50.

Supplicant:

It is an entity being authenticated by an authenticator. It is used to communicate with the Authenticator PAE (Port Access Entity) by exchanging the authentication message when the Authenticator PAE request to it.

Authenticator:

An entity facilitates the authentication of the supplicant entity. It controls the state of the port, authorized or unauthorized, according to the result of authentication message exchanged between it and a supplicant PAE. The authenticator may request the supplicant to re-authenticate itself at a configured time period. Once start re-authenticating the supplicant, the controlled port keeps in the authorized state until re-authentication fails.

A port acting as an authenticator is thought to be two logical ports, a controlled port and an uncontrolled port. A controlled port can only pass the packets when the authenticator PAE is authorized, and otherwise, an uncontrolled port will unconditionally pass the packets with PAE group MAC address, which has the value of 01-80-c2-00-00-03 and will not be forwarded by MAC bridge, at any time.

Authentication server:

A device provides authentication service, through EAP, to an authenticator by using authentication credentials supplied by the supplicant to determine if the supplicant is authorized to access the network resource.

Publication date: June, 2005

Revision A1

109

Page 119
Image 119
Ruby Tech GS-2124C manual 109

GS-2124C specifications

The Ruby Tech GS-2124C represents a significant advancement in technology, specifically designed for users who require reliability and high performance. This versatile device is characterized by its robust build quality combined with cutting-edge features, making it an ideal choice for both personal and professional applications.

One of the main features of the GS-2124C is its powerful processor. The device is equipped with an advanced multi-core CPU, which ensures smooth operation even when handling demanding tasks. This makes it suitable for multitasking, whether you’re working on data-intensive applications or running virtual environments.

In terms of memory and storage, the GS-2124C comes with substantial RAM and high-capacity storage options. This ensures that users can run multiple applications simultaneously without experiencing any slowdowns, while also providing ample space for data and applications. The device supports SSD technology, which accelerates data access and enhances overall performance.

Connectivity is another strong point for the Ruby Tech GS-2124C. With a range of ports including USB, HDMI, and Ethernet, it ensures seamless integration with other devices and peripherals. This connectivity also supports high-speed internet access, making online tasks like video conferencing and streaming smooth and efficient.

The Ruby Tech GS-2124C is also designed with user experience in mind. Its intuitive interface allows for easy navigation, while customizable settings cater to personal preferences. The device features advanced security options including biometric authentication and encryption, ensuring that sensitive data remains protected.

Furthermore, the GS-2124C incorporates the latest technologies, including AI-assisted functionalities that streamline workflows and enhance user productivity. This integration of AI not only facilitates smarter multitasking but also enables predictive performance adjustments based on usage patterns.

Overall, the Ruby Tech GS-2124C stands out for its combination of performance, versatility, and user-friendly design. Whether for everyday tasks or complex operations, this device is built to handle a variety of demands efficiently, making it a compelling choice for anyone in the market for a reliable technological solution. This device exemplifies Ruby Tech's commitment to innovation and quality, ensuring that it meets the needs of modern users effectively.