Fixed Switch Configuration Guide 10-1
10
Configuring User Authentication
This chapter describes the user authentication methods supported by Enterasys fixed switch
platforms.
User Authentication Overview
Authentication is the ability of a network access server, with a database of valid users and devices,
to acquire and verify the appropriate credentials of a user or device (supplicant) attempting to
gain access to the network. Enterasys authentication uses the RADIUS protocol to control access to
switch ports from an authentication server and to manage the message exchange between the
authenticating device and the server.
Both MultiAuth and multi-user authentication are supported. MultiAuth is the ability to configure
multiple authentication modes for a user and apply the authentication mode with the highest
precedence. Multi-user is the ability to appropriately authenticate multiple supplicants on a single
link and provision network resources, based upon an appropriate policy for each supplicant. The
Enterasys fixed switch products support the following authentication methods:
• IEEE 802.1x
• MAC-based Authentication (MAC)
• Port Web Authentication (PWA)
Enterasys switch products support the configuration of up to three simultaneous authentication
methods per user, with a single authentication method applied based upon MultiAuth
authentication precedence.
Network resources represent a major capital investment for your organization and can be
vulnerable to both undesired resource usage and malicious intent from outside users.
Authentication provides you with a user validation function which assures that the supplicant
requesting access has the right to do so and is a known entity. To the degree a supplicant is not a
known entity, access can be denied or granted on a limited basis. The ability of authentication to
both validate a user’s identity and define the resources available to the user assures that valuable
network resources are being used for the purposes intended by the network administrator.
For information about... Refer to page...
User Authentication Overview 10-1
Configuring Authentication 10-12
Authentication Configuration Example 10-25
Terms and Definitions 10-28