Netgear M7300-24XF (XSM7224S) - ProSAFE 24-port, 10 Gigabit Stackable L2+ Managed Switch ユーザーズマニュアル

ページ / 537
  Appendix :  Configuration Examples
 
   
|
     
519
ProSafe® XSM7224S 10G Managed Stackable Switch Software Administration Manual 
is connected can be desirable in order to restrict access to publicly accessible bridge ports or 
to restrict access to departmental LANs.
Access control is achieved by enforcing authentication of supplicants that are attached to an 
authenticator's controlled ports. The result of the authentication process determines whether 
the supplicant is authorized to access services on that controlled port.
A Port Access Entity (PAE) is able to adopt one of two distinct roles within an access control 
interaction:
1. 
Authenticator
: A Port that enforces authentication before allowing access to services 
available via that Port.
2. 
Supplicant
: A Port that attempts to access services offered by the Authenticator.
Additionally, there exists a third role:
3. 
Authentication server
: Performs the authentication function necessary to check the 
credentials of the Supplicant on behalf of the Authenticator.
All three roles are required in order to complete an authentication exchange.
NETGEAR® switches support the Authenticator role only, in which the PAE is responsible for 
communicating with the Supplicant. The Authenticator PAE is also responsible for submitting 
the information received from the Supplicant to the Authentication Server in order for the 
credentials to be checked, which will determine the authorization state of the Port. The 
Authenticator PAE controls the authorized/unauthorized state of the controlled Port 
depending on the outcome of the RADIUS-based authentication process.
Supplicant
Supplicant
Authenticator
Switch
Authentication
Server (RADIUS)
192.168.10.23
802.1X Example Configuration
This example shows how to configure the switch so that 802.1X-based authentication is 
required on the ports in a corporate conference room (1/0/5 - 1/0/8). These ports are 
available to visitors and need to be authenticated before granting access to the network. The 
authentication is handled by an external RADIUS server. When the visitor is successfully 
authenticated, traffic is automatically assigned to the guest VLAN. This example assumes 
that a VLAN has been configured with a VLAN ID of 150 and VLAN Name of Guest.