1-1 
1  802.1x Configuration 
Introduction to 802.1x 
The 802.1x protocol (802.1x for short) was developed by IEEE802 LAN/WAN committee to address 
security issues of wireless LANs. It was then used in Ethernet as a common access control mechanism 
for LAN ports to address mainly authentication and security problems. 
802.1x is a port-based network access control protocol. It authenticates and controls devices 
requesting for access in terms of the ports of LAN access devices. With the 802.1x protocol employed, 
a user-side device can access the LAN only when it passes the authentication. Those fail to pass the 
authentication are denied when accessing the LAN.  
Architecture of 802.1x Authentication 
As shown in Figure 1-1, 802.1x adopts a client/server architecture with three entities: a supplicant 
system, an authenticator system, and an authentication server system. 
Figure 1-1 Architecture of 802.1x authentication 
 
 
z  The supplicant system is an entity residing at one end of a LAN segment and is authenticated by 
the authenticator system at the other end of the LAN segment. The supplicant system is usually a 
user terminal device. An 802.1x authentication is triggered when a user launches client program on 
the supplicant system. Note that the client program must support the extensible authentication 
protocol over LAN (EAPoL). 
z  The authenticator system is another entity residing at one end of a LAN segment. It authenticates 
the connected supplicant systems. The authenticator system is usually an 802.1x-supported 
network device (such as a 3Com series switch). It provides the port (physical or logical) for the 
supplicant system to access the LAN. 
z  The authentication server system is an entity that provides authentication service to the 
authenticator system. Normally in the form of a RADIUS server, the authentication server system 
serves to perform AAA (authentication, authorization, and accounting) services to users. It also