05.08.2013 Views

Download - D-Link

Download - D-Link

Download - D-Link

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

DES-3028 DES-3028P DES-3028G DES-3052 DES-3052P Layer 2 Fast Ethernet Managed Switch<br />

detects events that indicate the attachment of an active device at the remote end of the link, or an active device becoming inactive.<br />

These events can be used to control the authorization state of the Port and initiate the process of authenticating the attached device<br />

if the Port is unauthorized. This is the Port-Based Network Access Control.<br />

802.1X Port-based Access Control<br />

802.1X<br />

Client<br />

802.1X<br />

Client<br />

802.1X<br />

Client<br />

Ethernet Switch<br />

802.1X<br />

Client<br />

Network access controlled port<br />

Network access uncontrolled port<br />

802.1X<br />

Client<br />

802.1X<br />

Client<br />

802.1X<br />

Client<br />

802.1X<br />

Client<br />

…<br />

Figure 10- 20. Example of Typical Port-Based Configuration<br />

RADIUS<br />

Server<br />

Once the connected device has successfully been authenticated, the Port then becomes Authorized, and all subsequent traffic on<br />

the Port is not subject to access control restriction until an event occurs that causes the Port to become Unauthorized. Hence, if the<br />

Port is actually connected to a shared media LAN segment with more than one attached device, successfully authenticating one of<br />

the attached devices effectively provides access to the LAN for all devices on the shared segment. Clearly, the security offered in<br />

this situation is open to attack.<br />

201<br />

802.1X<br />

Client

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!