1x port-based access network control overview – Allied Telesis AT-S60 User Manual
Page 550

Chapter 28: 802.1x Port-based Access Control
Section V: Security Features
550
802.1x Port-based Access Network Control Overview
The AT-S60 management software has several different methods for
protecting your network and its resources from unauthorized access.
This chapter explains yet another method of securing your network
using the port-based access control (IEEE 802.1x) feature.This feature
uses the RADIUS protocol to control who can send traffic through and
receive traffic from a port. With this feature, the switch does not allow an
end node to send or receive traffic through a port until the user of the
node has logged on by entering a username and password that the
RADIUS server validates.
The benefit to this type of network security is obvious. This feature can
prevent an unauthorized individual from connecting a computer to a
port or using an unattended workstation to access your network
resources. Only those users to whom you have assigned valid user
names and passwords are able to use the switch to access the network
This port security method uses the RADIUS authentication protocol. The
AT-S60 software comes with RADIUS client software. If you have already
read Chapter 27, TACACS+ and RADIUS Protocols on page 540, then you
know that you can also use the RADIUS client software on the switch,
along with a RADIUS server on your network, to create new manager
accounts that control who can manage and change the AT-S60
parameter on the switch.
Note
RADIUS with Extensible Authentication Protocol (EAP) extensions is
the only supported authentication server for this feature. The port-
based access control feature is not supported with the TACACS+
authentication protocol. The switch can support only one
authentication protocol at a time. Consequently, to implement IEEE
802.1 port-based access control as explained in this chapter, and
create new manager accounts as explained in Chapter 27, you must
use the RADIUS protocol.
Here are a few terms to keep in mind when using this feature.
❑ Supplicant - A supplicant is an end user or end node that wants to
access the network through a port. A supplicant is also referred to
as a client.
❑ Authenticator - The authenticator is a port on the switch that
prohibits network access by a supplicant until the network user
has entered a valid username and password.