30.07.2013 Views

Product Manual

Product Manual

Product Manual

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

802.1X<br />

Client<br />

802.1X<br />

Client<br />

DES-3526 / DES-3526DC Fast Ethernet Layer 2 Switch<br />

802.1X<br />

Client<br />

Ethernet Switch<br />

802.1X<br />

Client<br />

Network access controlled port<br />

Network access uncontrolled port<br />

802.1X<br />

Client<br />

102<br />

802.1X<br />

Client<br />

802.1X<br />

Client<br />

802.1X<br />

Client<br />

…<br />

Figure 6- 71. Example of Typical Port-Based Configuration<br />

RADIUS<br />

Server<br />

Once the connected Client has successfully been authenticated, the Port then becomes Authorized, and<br />

all subsequent traffic on the Port is not subject to access control restriction until an event occurs that<br />

causes the Port to become Unauthorized. Hence, if the Port is actually connected to a shared media<br />

LAN segment with more than one attached device, successfully authenticating one of the attached<br />

devices effectively provides access to the LAN for all devices on the shared segment. Clearly, the<br />

security offered in this situation is open to attack.<br />

802.1X<br />

Client

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!