132 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION:  C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell 
Contax\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 9/11/12 - FOR PROOF ONLY
Dot1x Authentication
This section describes Dot1x authentication.
It contains the following topics: 
• Port-Based Authentication Overview
• Dot1x Overview
• Port-Based Authentication Global
• Port-Based Authentication Interface Settings
• Monitoring Users
• Host Authentication
• Port Authentication Users
Port-Based Authentication Overview
Port-based authentication enables authenticating system users on a per-port 
basis via an external server. Only authenticated and approved system users 
can transmit and receive data. Ports are authenticated via the RADIUS server 
using the Extensible Authentication Protocol (EAP). Port Authentication 
includes:
•
Authenticators
 — Specifies the device port that is authenticated before 
permitting system access.
•
Supplicants
 — Specifies the host connected to the authenticated port hat 
is requesting to access the system services.
•
Authentication Server
 — Specifies the external server, for example, a 
RADIUS server, which performs authentication on behalf of the 
authenticator, and indicates whether the supplicant is authorized to access 
system services. 
Port-based authentication creates two access states:
•
Controlled Access
 — Permits communication between the supplicant and 
the system, if the supplicant is authorized. 
•
Uncontrolled Access
 — Permits uncontrolled communication, regardless 
of the port authorization state.