Westermo RedFox Series User Manual

Page 280

Advertising
background image

Westermo OS Management Guide

Version 4.17.0-0

INTERNET

PC

PC

Access controlled
ports

client

Authenticated

5

Switch

1

2

3

4

8

7

6

Server

Blocked
ports

Figure 13.4: Port-based network access control

Port-based access control and VLAN trunk ports

As of WeOS v4.17.0, port-based access control is only working as expected
for access ports, i.e., ports only associated with a single VLAN (untagged).
VLAN trunk ports (ports associated tagged to one or more VLANs) should be
excluded from access control. Although it is possible to have access control
enabled on such ports, the behaviour is neither defined nor supported, and
may change in future WeOS releases.

In order to acquire access, the connected device needs to authenticate itself to
the switch. See

fig. 13.4

for a scenario. The PC on port 1 has authenticated it-

self, whereas the one on port 2 has not. The first PC is able to access the server
or the Internet connection on ports 6 and 8. The second PC or anything con-
nected to ports 3 or 4 will be blocked by the switch until they have authenticated
themselves.

The two authentication mechanisms available in WeOS for port-based network
access control are described further below: IEEE 802.1X in

section 13.2.1

and

MAC based authentication in

section 13.2.2

.

280

➞ 2015 Westermo Teleindustri AB

Advertising
This manual is related to the following products: