EasyManuals Logo

D-Link xStack DGS-3610 Series User Manual

D-Link xStack DGS-3610 Series
703 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #509 background imageLoading...
Page #509 background image
DGS-3610 Series Configuration Guide Chapter 37 Configuration of 802.1X
37-1
37 Configuration of 802.1X
This chapter describes the contents related to the AAA service configurations. The 802.1X is
used to control the authentication over network access of users, and provide authorization
and accounting functions for users.
This chapter includes:
Overview
Configuring 802.1X
Viewing the Configuration and Current Statistics of the 802.1X
Other Precautions for Configuring 802.1X
Note
For details about usage and descriptions of the CLI commands used in
this section, please refer to Configuring 802.1X command.
37.1 Overview
In an IEEE 802 LAN, users can access the network device without needing authentication
and authorization as long as they are connected to the network device. Therefore, an
unauthorized user can access the network without obstruction by connecting the LAN. With
wide application of the LAN technology and particularly the appearance of the operation
network, it is necessary to address the safety authentication needs of the network. It has
become the focus in the industry that how to provide users with the authentication on the
legality of network or device access on the basis of simple and cheap Ethernet technologies.
The IEEE 802.1x protocol is developed under such a context.
As a Port-Based Network Access Control standard, the IEEE802.1x provides LAN with
point-to-point security access. Specially designed by the IEEE Standardization Commission
to tackle the security defects of Ethernet, this standard can provide a means for
authenticating the devices and users connected to the LAN by utilizing the advantages of
IEEE 802 LAN.
The IEEE 802.1x defines a mode based on Client-Server to restrict unauthorized users from
accessing the network. Before a client can access the network, it must first pass the server
authentication.

Table of Contents

Other manuals for D-Link xStack DGS-3610 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the D-Link xStack DGS-3610 Series and is the answer not in the manual?

D-Link xStack DGS-3610 Series Specifications

General IconGeneral
BrandD-Link
ModelxStack DGS-3610 Series
CategorySwitch
LanguageEnglish

Related product manuals