Configuring 802.1x, Introduction to 802.1x and eap, 1x configuration in the ews – Dell 7130cdn Color Laser Printer User Manual

Page 50

Advertising
background image

Security Features

Dell 7130cdn Professional Color Printer
System Administrator Guide

50

Configuring 802.1X

Introduction to 802.1X and EAP

The 802.1X IEEE standard defines port-based, authenticated network ColorTrack for Ethernet
local area networks (LANs). With 802.1X, the user or device must pass network ColorTrack by
successfully authenticating with credentials, such as a name and password, or else network
access is denied. 802.1X uses the Extensible Authentication Protocol (EAP) to relay port access
requests between LAN stations/the clients being authenticated (supplicants), Ethernet switches
or wireless access points (authenticators), and RADIUS servers (authentication servers).

EAP is the standard authentication mechanism carried over 802.1X. The EAP method is an inner
authentication protocol that provides the secure mechanism for the authentication exchange.
Multiple EAP methods can be used. EAP methods are defined in International Engineering Task
Force (IETF) Requests for Comments (RFC) documents, RFC drafts, or they can be proprietary.
EAP methods have a significant influence on how your network is designed and implemented,
because not all supplicants, not all access points, and not all RADIUS servers support all EAP
methods. A careful evaluation of standards can help with selecting appropriate LAN components
that will avoid vendor lock-in or dead-end technology.

802.1X Configuration in the EWS

Use the 802.1X configuration pages in the EWS to perform the following tasks. Required
information varies depending on the EAP method(s) that you select.

Note:

Access to the 802.1x configuration pages in the EWS can be restricted by the

passwords and feature authorization settings under Administrative Security.

1. Launch your Web browser.
2. Enter the printer’s IP address in the browser Address field. For details, see

Finding the

Printer’s IP Address

on page 13.

3. Click Properties.
4. On the left navigation pane, expand the Security folder and select 802.1X.
5. If you are a more experienced user, click the Advanced button; otherwise, click the

Configuration Wizard button which will guide you through the setup.
For more information, click the Help button in the EWS to view the EWS Online Help.

6. Select EAP authentication method(s) – Select one or more authentication methods:

MD5 Challenge

TLS

PEAP-MS-CHAPv2 (PEAP)

If you selected a method that uses X.509 security certificates (TLS or PEAP), you can use
use a root certificate to validate the authenticating server’s certificate.
If you have selected TLS authentication, you must either install a signed device certificate
that is trusted by the authenticating server, or add the device’s self-signed certificate to the
authenticating server’s trusted certificate store.

7. Install root certificate – If you select EAP method(s) that require a root certificate, you can:

Advertising