Port-based authentication overview, Dot1x overview – Dell PowerEdge VRTX User Manual

Page 229

Advertising
background image

229

FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Plasma\User

Guide\Plasma_UGSwitching_NetworkSecurity.fm

D E L L CO N F I D E N T I A L – P R E L I MI N A RY 4/ 1 8 /1 3 - F O R PR O O F O N LY

Port-Based Authentication Global
Port-Based Authentication Interface Settings
Monitoring Users
Host Authentication
Port Authentication Users

Port-Based Authentication Overview

Port-based authentication enables authenticating system users on a per-port

basis via an external server. Only authenticated and approved system users

can transmit and receive data. Ports are authenticated via the RADIUS server

using the Extensible Authentication Protocol (EAP). Port Authentication

includes:

Authenticators — Specifies the device port that is authenticated before

permitting system access.

Supplicants — Specifies the host connected to the authenticated port hat

is requesting to access the system services.

Authentication Server — Specifies the external server, for example, a

RADIUS server, which performs authentication on behalf of the

authenticator, and indicates whether the supplicant is authorized to access

system services.

Port-based authentication creates two access states:

Controlled Access — Permits communication between the supplicant and

the system, if the supplicant is authorized.

Uncontrolled Access — Permits uncontrolled communication, regardless

of the port authorization state.

The device supports Port Based Authentication via RADIUS servers.

Dot1x Overview

Dot1x is an IEEE standard for port-based network access control. The Dot1x

framework enables a device (the supplicant) to request port access from a

remote device (authenticator) to which it is connected. The supplicant is

permitted to send data to the port only after it is authenticated and

Advertising