30.07.2013 Views

Product Manual

Product Manual

Product Manual

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

DES-3526 / DES-3526DC Fast Ethernet Layer 2 Switch<br />

Figure 6- 66. EAPOL Packet<br />

Utilizing this method, unauthorized devices are restricted from connecting to a LAN through a port to which the user is<br />

connected. EAPOL packets are the only traffic that can be transmitted through the specific port until authorization is<br />

granted. The 802.1x Access Control protocol consists of three components, each of which is vital to creating and<br />

maintaining a stable and working Access Control security method.<br />

Figure 6- 67. Three Functions of 802.1x<br />

The following section will explain Client, Authenticator, and Authentication Server in greater detail.<br />

Authentication Server<br />

The Authentication Server is a remote device that is connected to the same network as the Client and Authenticator, must<br />

be running a RADIUS Server program and must be configured properly on the Authenticator (Switch). The Authentication<br />

Server (RADIUS) must authenticate clients connected to a port on the Switch before attaining any services offered by the<br />

Switch on the LAN. The role of the Authentication Server is to certify the identity of the Client attempting to access the<br />

network by exchanging secure information between the RADIUS server and the Client through EAPOL packets and, in<br />

turn, informs the Switch whether or not the Client is granted access to the LAN and/or switch services.<br />

99

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!