beautypg.com

Figure 53. example of the authenticator role – Allied Telesis AT-S105 User Manual

Page 170

background image

Chapter 14: 802.1x Port-based Network Access Control

170

Figure 53 illustrates the practical examples of these three authenticator
port control settings when a RADIUS server is in your network.

Figure 53. Example of the Authenticator Role

ˆ

Port 20 is set to Auto. The end node connected to the port must use its
802.1x client software and provide a user name and password to send
or receive traffic from the switch.

ˆ

Port 34 is set to the Force-authorized setting so that the end node
connected to the port does not have to provide a user name or
password to send or receive traffic from the switch. In the example, the
node is the RADIUS authentication server. Since the server cannot
authenticate itself, its port must be set to Force-authorized in order for
it to pass traffic through the port.

ˆ

Port 37 is an example of a port set to Force-unauthorized to prevent
anyone from using the port.

Port 34

802.1x Port Control:

Setting: Force-authorized

RADIUS

Authentication

Server

Port 37

802.1x Port Control:

Setting: Force-unauthorized

Port 20

802.1x Port Control

Setting: Auto

Supplicant with

802.1x Client

Software