Dell PowerConnect 5548 User Guide - Page 127
Dot1x Authentication, Port-Based Authentication Overview
View all Dell PowerConnect 5548 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 127 highlights
Dot1x Authentication This section describes Dot1x authentication. It contains the following topics: • Port-Based Authentication Overview • Dot1x Overview • Port-Based Authentication Global • Port-Based Authentication Interface Settings • Monitoring Users • Host Authentication • Port Authentication Users Port-Based Authentication Overview Port-based authentication enables authenticating system users on a per-port basis via an external server. Only authenticated and approved system users can transmit and receive data. Ports are authenticated via the RADIUS server using the Extensible Authentication Protocol (EAP). Port Authentication includes: • Authenticators - Specifies the device port that is authenticated before permitting system access. • Supplicants - Specifies the host connected to the authenticated port hat is requesting to access the system services. • Authentication Server - Specifies the external server, for example, a RADIUS server, which performs authentication on behalf of the authenticator, and indicates whether the supplicant is authorized to access system services. Port-based authentication creates two access states: • Controlled Access - Permits communication between the supplicant and the system, if the supplicant is authorized. • Uncontrolled Access - Permits uncontrolled communication, regardless of the port authorization state. Dell PowerConnect 55xx Systems User Guide 127