NETGEAR AV Line M4250 GSM4210PX 8-Port Gigabit PoE+ Compliant Managed AV Switch with SFP (220W) User Manual
Page 776
to attempt to access the LAN through equipment already attached. In such environments
you might want to restrict access to the services offered by the LAN to those users and
devices that are permitted to use those services.
Port-based network access control makes use of the physical characteristics of LAN
infrastructures to provide a means of authenticating and authorizing devices attached
to a LAN port with point-to-point connection characteristics. If the authentication and
authorization process fails, access control prevents access to that port. In this context,
a port is a single point of attachment to the LAN, such as a port of a MAC bridge and
an association between stations or access points in IEEE 802.11 wireless LANs.
The IEEE 802.11 standard describes an architectural framework within which
authentication and consequent actions take place. It also establishes the requirements
for a protocol between the authenticator (the system that passes an authentication
request to the authentication server) and the supplicant (the system that requests
authentication), as well as between the authenticator and the authentication server.
The switch support a guest VLAN, which allows unauthenticated users limited access
to the network resources.
Note: You can use QoS features to provide rate limiting on the guest VLAN to limit the
network resources the guest VLAN provides.
Another 802.1X feature is the ability to configure a port to enable or disable EAPoL
packet forwarding support. You can disable or enable the forwarding of EAPoL when
802.1X is disabled on the device.
The ports of an 802.1X authenticator switch provide the means by which it can offer
services to other systems reachable through the LAN. Port-based network access control
allows the operation of a switch’s ports to be controlled to ensure that access to its
services is permitted only by systems that are authorized to do so.
Port access control provides a means of preventing unauthorized access by supplicants
to the services offered by a system. Control over the access to a switch and the LAN to
which it is connected can be desirable if you restrict access to publicly accessible bridge
ports or to restrict access to departmental LANs.
Access control is achieved by enforcing authentication of supplicants that are attached
to an authenticator's controlled ports. The result of the authentication process determines
whether the supplicant is authorized to access services on that controlled port.
Main User Manual
776
Configuration Examples
AV Line of Fully Managed Switches M4250 Series Main User Manual