Dell PowerEdge M520 Dell PowerConnect M6220/M6348/M8024 Switches Configuration - Page 97

Device Security, 802.1x Network Access Control

Page 97 highlights

5 Device Security This section describes configuration scenarios for the following features: • "802.1x Network Access Control" on page 97 • "802.1X Authentication and VLANs" on page 100 • "802.1x MAC Authentication Bypass (MAB)" on page 103 • "Authentication Server Filter Assignment" on page 105 • "Access Control Lists (ACLs)" on page 106 • "RADIUS" on page 113 • "TACACS+" on page 115 • "Captive Portal" on page 117 802.1x Network Access Control Port-based network access control allows the operation of a system's port(s) to be controlled to ensure that access to its services is permitted only by systems that are authorized to do so. Port Access Control provides a means of preventing unauthorized access by supplicants or users to the services offered by a system. Control over the access to a switch and the LAN to which it is connected can be desirable in order to restrict access to publicly accessible bridge ports or departmental LANs. The PowerConnect M6220/M6348/M8024 switches achieve access control by enforcing authentication of supplicants that are attached to an authenticator's controlled ports. The result of the authentication process determines whether the supplicant is authorized to access services on that controlled port. A PAE (Port Access Entity) can adopt one of two roles within an access control interaction: • Authenticator - Port that enforces authentication before allowing access to services available via that Port. • Supplicant - Port that attempts to access services offered by the Authenticator. Additionally, there exists a third role: • Authentication server - Server that performs the authentication function necessary to check the credentials of the supplicant on behalf of the Authenticator. Device Security 97

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158

Device Security
97
5
Device Security
This section describes configuration scenarios for the following features:
"802.1x Network Access Control" on page 97
"802.1X Authentication and VLANs" on page 100
"802.1x MAC Authentication Bypass (MAB)" on page 103
"Authentication Server Filter Assignment" on page 105
"Access Control Lists (ACLs)" on page 106
"RADIUS" on page 113
"TACACS+" on page 115
"Captive Portal" on page 117
802.1x Network Access Control
Port-based network access control allows the operation of a system’s port(s) to be controlled to
ensure that access to its services is permitted only by systems that are authorized to do so.
Port Access Control provides a means of preventing unauthorized access by supplicants or users to
the services offered by a system. Control over the access to a switch and the LAN to which it is
connected can be desirable in order to restrict access to publicly accessible bridge ports or
departmental LANs.
The PowerConnect M6220/M6348/M8024 switches achieve access control by enforcing
authentication of supplicants that are attached to an authenticator’s controlled ports. The result of
the authentication process determines whether the supplicant is authorized to access services on
that controlled port.
A PAE (Port Access Entity) can adopt one of two roles within an access control interaction:
Authenticator – Port that enforces authentication before allowing access to services available via
that Port.
Supplicant – Port that attempts to access services offered by the Authenticator.
Additionally, there exists a third role:
Authentication server – Server that performs the authentication function necessary to check the
credentials of the supplicant on behalf of the Authenticator.