beautypg.com

PLANET WGSD-10020 User Manual

Page 228

background image

User’s Manual of WGSD / WGSW Layer 2+ Series

to authenticate. The disadvantage is that MAC addresses can be spoofed by malicious users, equipment whose MAC address

is a valid RADIUS user can be used by anyone, and only the MD5-Challenge method is supported.

The 802.1X and MAC-Based Authentication configuration consists of two sections, a system- and a port-wide.

Overview of User Authentication

It is allowed to configure the Managed Switch to authenticate users logging into the system for management access using local

or remote authentication methods, such as telnet and Web browser. This Managed Switch provides secure network

management access using the following options:

Remote Authentication Dial-in User Service (RADIUS)

Terminal Access Controller Access Control System Plus (TACACS+)

Local user name and Priviledge Level control

RADIUS and TACACS+

are logon authentication protocols that use software running on a central server to control access to

RADIUS-aware or TACACS-aware devices on the network. An authentication server contains a database of multiple user

name / password pairs with associated privilege levels for each user that requires management access to the Managed Switch.

4.11.1 Understanding IEEE 802.1X Port-based Authentication

The IEEE 802.1X standard defines a client-server-based access control and authentication protocol that restricts unauthorized

clients from connecting to a LAN through publicly accessible ports. The authentication server authenticates each client

connected to a switch port before making available any services offered by the switch or the LAN.

Until the client is authenticated, 802.1X access control allows only Extensible Authentication Protocol over LAN (EAPOL)

traffic through the port to which the client is connected. After authentication is successful, normal traffic can pass through the

port.

This section includes this conceptual information:

 Device Roles

 Authentication Initiation and Message Exchange

 Ports in Authorized and Unauthorized States

Device Roles

With 802.1X port-based authentication, the devices in the network have specific roles as shown below.

228

This manual is related to the following products: