HP GbE2c HP GbE2c Ethernet Blade Switch for c-Class BladeSystem Application Gu - Page 39

Port-based Network Access and traffic control, Extensible authentication protocol over LAN - blade switch

Page 39 highlights

Port-based Network Access and traffic control Port-based Network Access control Port-based Network Access control provides a means of authenticating and authorizing devices attached to a LAN port that has point-to-point connection characteristics. It prevents access to ports that fail authentication and authorization. This feature provides security to all ports of the GbE2c Ethernet Blade Switch. The following topics are discussed in this section: • Extensible Authentication Protocol over LAN • 802.1x Authentication Process • 802.1x Port States • Supported RADIUS Attributes • Configuration Guidelines Extensible authentication protocol over LAN GbE2c software can provide user-level security for its ports using the IEEE 802.1x protocol, which is a more secure alternative to other methods of port-based network access control. Any device attached to an 802.1x-enabled port that fails authentication is prevented access to the network and denied services offered through that port. The 802.1x standard describes port-based network access control using Extensible Authentication Protocol over LAN (EAPoL). EAPoL provides a means of authenticating and authorizing devices attached to a LAN port that has point-topoint connection characteristics and of preventing access to that port in cases of authentication and authorization failures. EAPoL is a client-server protocol that has the following components: • Supplicant or Client-The Supplicant is a device that requests network access and provides the required creden- tials (user name and password) to the Authenticator and the Authentication Server. • Authenticator-The Authenticator enforces authentication and controls access to the network. The Authenticator grants network access based on the information provided by the Supplicant and the response from the Authentication Server. The Authenticator acts as an intermediary between the Supplicant and the Authentication Server: requesting identity information from the client, forwarding that information (encapsulated in RADIUS packets) to the Authentication Server for validation, relaying the server's responses to the client, and authorizing network access based on the results of the authentication exchange. The GbE2c acts as an Authenticator. • Authentication Server-The Authentication Server validates the credentials provided by the Supplicant to determine if the Authenticator should grant access to the network. The Authentication Server may be co-located with the Authenticator. The switch relies on external RADIUS servers for authentication. Upon a successful authentication of the client by the server, the 802.1x-controlled port transitions from unauthorized to authorized state, and the client is allowed full access to services through the port. When the client sends an EAPLogoff message to the authenticator, the port will transition from authorized to unauthorized state. 802.1x authentication process The clients and authenticators communicate using Extensible Authentication Protocol (EAP), which was originally designed to run over PPP, and for which the IEEE 802.1x Standard has defined an encapsulation method over Ethernet frames, called EAP over LAN (EAPOL). Port-based Network Access and traffic control 39

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165

Port-based Network Access and traffic control
39
Port-based Network Access and traffic control
Port-based Network Access control
Port-based Network Access control provides a means of authenticating and authorizing devices attached to a LAN
port that has point-to-point connection characteristics. It prevents access to ports that fail authentication and
authorization. This feature provides security to all ports of the GbE2c Ethernet Blade Switch.
The following topics are discussed in this section:
Extensible Authentication Protocol over LAN
802.1x Authentication Process
802.1x Port States
Supported RADIUS Attributes
Configuration Guidelines
Extensible authentication protocol over LAN
GbE2c software can provide user-level security for its ports using the IEEE 802.1x protocol, which is a more secure
alternative to other methods of port-based network access control. Any device attached to an 802.1x-enabled port
that fails authentication is prevented access to the network and denied services offered through that port.
The 802.1x standard describes port-based network access control using Extensible Authentication Protocol over LAN
(EAPoL). EAPoL provides a means of authenticating and authorizing devices attached to a LAN port that has point-to-
point connection characteristics and of preventing access to that port in cases of authentication and authorization
failures.
EAPoL is a client-server protocol that has the following components:
Supplicant or Client—The Supplicant is a device that requests network access and provides the required creden-
tials (user name and password) to the Authenticator and the Authentication Server.
Authenticator—The Authenticator enforces authentication and controls access to the network. The Authenticator
grants network access based on the information provided by the Supplicant and the response from the
Authentication Server. The Authenticator acts as an intermediary between the Supplicant and the Authentication
Server: requesting identity information from the client, forwarding that information (encapsulated in RADIUS
packets) to the Authentication Server for validation, relaying the server’s responses to the client, and authorizing
network access based on the results of the authentication exchange. The GbE2c acts as an Authenticator.
Authentication Server—The Authentication Server validates the credentials provided by the Supplicant to deter-
mine if the Authenticator should grant access to the network. The Authentication Server may be co-located with
the Authenticator. The switch relies on external RADIUS servers for authentication.
Upon a successful authentication of the client by the server, the 802.1x-controlled port transitions from unauthorized
to authorized state, and the client is allowed full access to services through the port. When the client sends an EAP-
Logoff message to the authenticator, the port will transition from authorized to unauthorized state.
802.1x authentication process
The clients and authenticators communicate using Extensible Authentication Protocol (EAP), which was originally
designed to run over PPP, and for which the IEEE 802.1x Standard has defined an encapsulation method over
Ethernet frames, called EAP over LAN (EAPOL).