25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Edge authentication<br />

The IEEE 802.1x st<strong>and</strong>ard suggests deploying 802.1x on edge switches closest<br />

to the device needing access to computing resources, as depicted in Figure 23-5<br />

on page 896. This approach creates the following advantages:<br />

► Security<br />

All authenticated end states on the local access bridge are protected from<br />

non-authenticated end stations. If authentication was performed on a core<br />

bridge, it is possible for a malicious end station to attack authenticated end<br />

stations connected to the same local access bridge, or any number of other<br />

local access bridges between this bridge <strong>and</strong> the core bridge. These attacks<br />

are eliminated by limiting service to non-authenticated end stations directly on<br />

the local access bridge.<br />

► Complexity<br />

If authentication is performed in the core of the LAN, there is the possibility of<br />

multiple bridges on a shared segment initiating authentication. To avoid this,<br />

the bridge protocol entity must manipulate the spanning tree states to make<br />

sure that only the bridge that lies in the forwarding path initiates<br />

authentication.<br />

► Scalability<br />

Implementing authentication in the core of the LAN requires authentication to<br />

depend on individual MAC addresses, not just on a physical point of<br />

attachment. This, in turn, requires that the authentication state be associated<br />

with the filtering database entry for that MAC address. This increases the<br />

implementation costs <strong>and</strong> requires changes to the operation of address aging<br />

<strong>and</strong> learning. Topology changes <strong>and</strong> spanning tree reconfigureation<br />

complicate the interaction in a large network.<br />

► Availability<br />

Bridged networks are frequently designed with availability as one of the<br />

primary goals. The core of the network is redundant fault-tolerant. If<br />

authentication is performed in the core, it requires reauthentication of all the<br />

end stations whenever topology changes cause port state changes in the<br />

spanning tree.<br />

► Translational bridging<br />

Performing authentication at the access bridge avoids complications arising<br />

from translational bridging or VLANS. If only a single link exists between the<br />

end station <strong>and</strong> the bridge, frames do not need to be translated or tagged<br />

during the authentication exchange. The path to a core bridge might involve a<br />

variety of link types (FDDI, token ring, <strong>and</strong> so on) <strong>and</strong> packet formats (for<br />

example, VLAN tagged frames, MAC encapsulations). Were authentication to<br />

be allowed on core bridges, additional rules might be necessary in order to<br />

specify how the authentication protocols are translated.<br />

Chapter 23. Port based network access control 905

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!