3com WX3000 Manuel D’Utilisation

Page de 715
 
1-2 
The authenticator system, residing at the other end of the LAN segment link, is the entity that 
authenticates the connected supplicant system. The authenticator system is usually an 
802.1x-supported network device. It provides ports (physical or logical) for the supplicant system to 
access the LAN. 
The authentication server system is the entity that provides authentication services to the 
authenticator system. The authentication server system, normally a RADIUS server, serves to 
perform AAA (authentication, authorization, and accounting) services to users. It also stores user 
information, such as user name, password, the VLAN a user should belong to, priority, and any 
ACLs (access control list) to be applied. 
There are four additional basic concepts related to 802.1x: port access entity (PAE), controlled port and 
uncontrolled port, the valid direction of a controlled port and the access control method of a port. 
Port access entity 
A PAE (port access entity) is responsible for implementing algorithms and performing protocol-related 
operations in the authentication mechanism. 
The authenticator system PAE authenticates the supplicant systems when they log into the LAN 
and controls the status (authorized/unauthorized) of the controlled ports according to the 
authentication result.  
The supplicant system PAE responds to the authentication requests received from the 
authenticator system and submits user authentication information to the authenticator system. It 
also sends authentication requests and disconnection requests to the authenticator system PAE. 
Controlled port and uncontrolled port 
The Authenticator system provides ports for supplicant systems to access a LAN. Logically, a port of 
this kind is divided into a controlled port and an uncontrolled port. 
The uncontrolled port can always send and receive packets. It mainly serves to forward EAPoL 
packets to ensure that a supplicant system can send and receive authentication requests. 
The controlled port can be used to pass service packets when it is in authorized state. It is blocked 
when not in authorized state. In this case, no packets can pass through it. 
Controlled port and uncontrolled port are two properties of a port. Packets reaching a port are 
visible to both the controlled port and uncontrolled port of the port. 
The valid direction of a controlled port 
When a controlled port is in unauthorized state, you can configure it to be a unidirectional port, which 
only sends packets out to supplicant systems. 
By default, a controlled port is a unidirectional port. 
Port access control method 
A port of the device can control user accesses in the following two ways. 
Port-based control. When a port works in the port-based control mode, all the supplicant systems 
connected to the port can access the network without being authenticated after one supplicant 
system among them passes the authentication. And when the authenticated supplicant system 
goes offline, the others are denied as well. 
MAC-based control. When a port works in the MAC-based control mode, all supplicant systems 
connected to the port have to be authenticated individually in order to access the network. And 
when a supplicant system goes offline, the others are not affected.