D-Link DWS-1008 Product Manual - Page 303

Authentication Rule Requirements

Page 303 highlights

Network administrators sometimes use machine authentication in a Microsoft Active Directory domain to run login scripts, and to control defaults, application access and updates, and so on. Bonded Auth provides an added security measure, by ensuring that a trusted user can log onto the network only from a trusted machine known to Active Directory. For example, if user bob.mycorp.com has a trusted laptop PC used for work but also has a personal laptop PC, you might want to bind Bob's authentication with the authentication of his workplace laptop, host/bob-laptop.mycorp.com. In this case, Bob can log on to the company network only from his work laptop. When Bonded Auth is enabled, MSS retains information about the machine's session when a user logs on from that machine. MSS authenticates the user only if there has already been a successful machine authentication. Evidence of the machine's session in MSS indicates that the machine has successfully authenticated and is therefore trusted by MSS. If MSS does not have session information for the machine, MSS refuses to authenticate the user and does not allow the user onto the network from the unauthenticated machine. Note: If the 802.1X reauthentication parameter or the RADIUS Session-Timeout parameter is applicable, the user must log in before the 802.1X reauthentication timeout or the RADIUS session-timeout for the machine's session expires. Normally, these parameters apply only to clients that use dynamic WEP, or use WEP-40 or WEP-104 encryption with WPA or RSN. Authentication Rule Requirements Bonded Auth requires an 802.1X authentication rule for the machine itself, and a separate 802.1X authentication rule for the user(s). Use the bonded option in the user authentication rule, but not in the machine authentication rule. The authentication rule for the machine must be higher up in the list of authentication rules than the authentication rule for the user. You must use 802.1X authentication rules. The 802.1X authentication rule for the machine must use pass-through as the protocol. D-Link recommends that you also use pass-through for the user's authentication rule. The rule for the machine and the rule for the user must use a RADIUS server group as the method. (Generally, in a Bonded Auth configuration, the RADIUS servers will use a user database stored on an Active Directory server.) D-Link recommends that you make the rules as general as possible. For example, if the Active Directory domain is mycorp.com, the following userglobs match on all machine names and users in the domain: • host/*.mycorp.com (userglob for the machine authentication rule) • *.mycorp.com (userglob for the user authentication rule) D-Link DWS-1008 User Manual 284

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502

D-Link DWS-1008 User Manual
±8³
Network administrators sometimes use machine authentication in a Microsoft Active Directory domain
to run login scripts, and to control defaults, application access and updates, and so on. Bonded Auth
provides an added security measure, by ensuring that a trusted user can log onto the network only from
a trusted machine known to Active Directory.
For example, if user
bob.mycorp.com
has a trusted laptop PC used for work but also has a personal
laptop PC, you might want to bind Bob’s authentication with the authentication of his workplace laptop,
host/bob-laptop.mycorp.com. In this case, Bob can log on to the company network only from his work
laptop.
When Bonded Auth is enabled, MSS retains information about the machine’s session when a user
logs on from that machine. MSS authenticates the user only if there has already been a successful
machine authentication. Evidence of the machine’s session in MSS indicates that the machine has
successfully authenticated and is therefore trusted by MSS. If MSS does not have session information
for the machine, MSS refuses to authenticate the user and does not allow the user onto the network
from the unauthenticated machine.
Note:
If the 802.1X reauthentication parameter or the RADIUS Session-Timeout parameter is applicable,
the user must log in before the 802.1X reauthentication timeout or the RADIUS session-timeout for the
machine’s session expires. Normally, these parameters apply only to clients that use dynamic WEP, or
use WEP-40 or WEP-104 encryption with WPA or RSN.
Authentication Rule Requirements
Bonded Auth requires an 802.1X authentication rule for the machine itself, and a separate 802.1X
authentication rule for the user(s). Use the bonded option in the user authentication rule, but not in the
machine authentication rule.
The authentication rule for the machine must be higher up in the list of authentication rules than the
authentication rule for the user.
You must use 802.1X authentication rules. The 802.1X authentication rule for the machine must use
pass-through
as the protocol. D-Link recommends that you also use
pass-through
for the user’s
authentication rule.
The rule for the machine and the rule for the user must use a RADIUS server group as the method.
(Generally, in a Bonded Auth configuration, the RADIUS servers will use a user database stored on an
Active Directory server.)
D-Link recommends that you make the rules as general as possible. For example, if the Active Directory
domain is mycorp.com, the following userglobs match on all machine names and users in the domain:
host/*.mycorp.com (userglob for the machine authentication rule)
*.mycorp.com (userglob for the user authentication rule)