3Com 2916-SFP User Guide - Page 52

Defining Port-Based Authentication (802.1X), Authenticators, Supplicants, Authentication Server

Page 52 highlights

52 CHAPTER 4: MANAGING DEVICE SECURITY Defining Port-Based Authentication (802.1X) Port-based authentication authenticates users on a per-port basis via an external server. Only authenticated and approved system users can transmit and receive data. Ports are authenticated via the RADIUS server using the Extensible Authentication Protocol (EAP). Port-based authentication includes: ■ Authenticators - Specifies the device port which is authenticated before permitting system access. ■ Supplicants - Specifies the host connected to the authenticated port requesting to access the system services. ■ Authentication Server - Specifies the server that performs the authentication on behalf of the authenticator, and indicates whether the supplicant is authorized to access system services. Port-based authentication creates two access states: ■ Controlled Access - Permits communication between the supplicant and the system, if the supplicant is authorized. ■ Uncontrolled Access - Permits uncontrolled communication regardless of the port state. This section includes the following topics: ■ Viewing 802.1X Authentication ■ Defining 802.1X Authentication

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216

52
C
HAPTER
4: M
ANAGING
D
EVICE
S
ECURITY
Defining Port-Based
Authentication
(802.1X)
Port-based authentication authenticates users on a per-port basis via an
external server. Only authenticated and approved system users can
transmit and receive data. Ports are authenticated via the RADIUS server
using the
Extensible Authentication Protocol
(EAP). Port-based
authentication includes:
Authenticators
— Specifies the device port which is authenticated
before permitting system access.
Supplicants
— Specifies the host connected to the authenticated
port requesting to access the system services.
Authentication Server
— Specifies the server that performs the
authentication on behalf of the authenticator, and indicates whether
the supplicant is authorized to access system services.
Port-based authentication creates two access states:
Controlled Access
— Permits communication between the
supplicant and the system, if the supplicant is authorized.
Uncontrolled Access
— Permits uncontrolled communication
regardless of the port state.
This section includes the following topics:
Viewing 802.1X Authentication
Defining 802.1X Authentication