beautypg.com

Figure 52. example of the authenticator role – Allied Telesis AT-S106 User Manual

Page 168

background image

Chapter 14: 802.1x Port-based Network Access Control

168

Figure 52 illustrates the practical examples of these three authenticator
port control settings when a RADIUS server is in your network.

Figure 52. Example of the Authenticator Role

ˆ

Port 20 is set to Auto. The end node connected to the port must use its
802.1x client software and provide a user name and password to send
or receive traffic from the switch.

ˆ

Port 34 is set to the Force-authorized setting so that the end node
connected to the port does not have to provide a user name or
password to send or receive traffic from the switch. In the example, the
node is the RADIUS authentication server. Since the server cannot
authenticate itself, its port must be set to Force-authorized in order for
it to pass traffic through the port.

ˆ

Port 37 is an example of a port set to Force-unauthorized to prevent
anyone from using the port.

1869

Port 34
802.1x Port Control:
Setting: Force-authorized

RADIUS
Authentication
Server

Port 37
802.1x Port Control:
Setting: Force-unauthorized

Port 20
802.1x Port Control
Setting: Auto

Supplicant with
802.1x Client
Software