9.2 802.1X
Switch can provide easy and open access to network resources for the connecting PC.
Although automatic configuration and access is a desirable feature, it also leads unauthorized
user to intrude and access to sensitive network data.
The IEEE 802.1X (dot1X) standard defines a port-based access control procedure that
prevents unauthorized user accessing the network by requiring users to first submit the
authenticated message to authentication server. Access to all switch interfaces in a network
can be centrally controlled from a server, which means that authorized users can use the same
authenticated message for authentication from any point within the network.
This switch uses the Extensible Authentication Protocol over LANs (EAPOL) to exchange
authentication messages between the client and RADIUS authentication server to verify user
identity and access rights. When a client (i.e., Supplicant) connects to a switch interface, the
switch (i.e., Authenticator) responds to an EAPOL identity request. The client provides its
identity (such as a user name) in an EAPOL response to the switch, which forwards to the
RADIUS server. The RADIUS server verifies the client identity and sends an allowed or
rejected message. The client can reject the authentication method and request another,
depending on the settings of client and RADIUS.
The RADIUS sends an accepted or a rejected message after verifying the content. If
authentication is successful, the switch allows the client to access the network. Otherwise,
non-EAP traffic on the interface will be blocked.
Port-based Access Control
Under Port-based access control, once the connected device passes the authentication
successfully, the interface turns to authorized status, and then all the traffic on this interface
will not be limited to the access control until the interface becomes unauthorized. Therefore,
if the network segment connected to the interface is a shared one in which multi network