How 802.1x port security works, Device roles in an 802.1x configuration – Brocade Communications Systems Brocade ICX 6650 6650 User Manual

Page 174

Advertising
background image

154

Brocade ICX 6650 Security Configuration Guide

53-1002601-01

How 802.1X port security works

How 802.1X port security works

This section explains the basic concepts behind 802.1X port security, including device roles, how
the devices communicate, and the procedure used for authenticating clients.

NOTE

802.1X Port Security cannot be configured on MAC Port Security-enabled ports.

Device roles in an 802.1X configuration

The 802.1X standard defines the roles of Client/Supplicant, Authenticator, and Authentication
Server
in a network.

The Client (known as a Supplicant in the 802.1X standard) provides username/password
information to the Authenticator. The Authenticator sends this information to the Authentication
Server. Based on the Client's information, the Authentication Server determines whether the Client
can use services provided by the Authenticator. The Authentication Server passes this information
to the Authenticator, which then provides services to the Client, based on the authentication result.

Figure 1

illustrates these roles.

FIGURE 1

Authenticator, client/supplicant, and authentication server in an 802.1X
configuration

Authenticator – The device that controls access to the network. In an 802.1X configuration, the
Brocade device serves as the Authenticator. The Authenticator passes messages between the
Client and the Authentication Server. Based on the identity information supplied by the Client, and
the authentication information supplied by the Authentication Server, the Authenticator either
grants or does not grant network access to the Client.

Client/Supplicant

RADIUS Server

(Authentication Server)

Brocade Switch

(Authenticator)

Advertising