19.07.2013 Views

CCNA Complete Guide 2nd Edition.pdf - Cisco Learning Home

CCNA Complete Guide 2nd Edition.pdf - Cisco Learning Home

CCNA Complete Guide 2nd Edition.pdf - Cisco Learning Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

IEEE 802.1X Port-Based Authentication<br />

- The IEEE 802.1X standard defines a client-server-based access control and authentication<br />

protocol that restricts unauthorized devices from gaining access to a network through publicly<br />

accessible ports. The authentication server authenticates a client connects to a switch port before<br />

granting the available network services to the client.<br />

- 802.1X allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through<br />

the switch port which an unauthenticated client is connected to. Normal traffic can pass through<br />

the switch port after authentication is completed successfully.<br />

- With 802.1X port-based authentication, network devices have the following device roles:<br />

Client<br />

(Supplicant)<br />

Switch or<br />

Access Point<br />

(Authenticator)<br />

Authentication<br />

Server<br />

The device (workstation) that requires access to the LAN. Responds to the<br />

requests from the switch. Must be running 802.1X-compliant client software.<br />

Controls the physical access to the network based on the authentication status<br />

of the client. Acts as a proxy between the client and authentication server,<br />

which requests identity information from the client, verify the information<br />

with the authentication server, and relays the response to the client.<br />

It is responsible for the re-encapsulation of the EAP and RADIUS frames<br />

for communication with a client and an authentication server respectively.<br />

Performs the authentication of the client. It validates the identity of the client<br />

and notifies the switch or access point whether the client is authorized to<br />

access the network. Currently, the RADIUS security system with EAP<br />

extensions is the only supported authentication server.<br />

Note: RADIUS is referred to as Remote Authentication Dial-In User Service.<br />

Methods<br />

Link<br />

Layers<br />

TLS<br />

Figure A6-21: The EAP Architecture<br />

- EAP is designed to run over any link layer and use any number of authentication methods.<br />

293<br />

AKA/<br />

SIM<br />

EAP<br />

Token<br />

Card<br />

PPP 802.3 802.11<br />

Copyright © 2008 Yap Chin Hoong<br />

yapchinhoong@hotmail.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!