Netgear M6100 – Campus Edge and SMB Core Chassis Switches ユーザーガイド
Configuration Examples
555
M6100 Web Management User Guide
is connected can be desirable in order to restrict access to publicly accessible bridge ports or
to restrict access to departmental LANs.
to restrict access to departmental LANs.
Access control is achieved by enforcing authentication of supplicants that are attached to an
authenticator's controlled ports. The result of the authentication process determines whether
the supplicant is authorized to access services on that controlled port.
the supplicant is authorized to access services on that controlled port.
A Port Access Entity (PAE) is able to adopt one of two distinct roles within an access control
interaction:
1.
Authenticator
: A Port that enforces authentication before allowing access to services
available via that Port.
2.
Supplicant
: A Port that attempts to access services offered by the Authenticator.
Additionally, there exists a third role:
3.
Authentication server
: Performs the authentication function necessary to check the
credentials of the Supplicant on behalf of the Authenticator.
All three roles are required in order to complete an authentication exchange.
M6100 Managed Chassis switches support the Authenticator role only, in which the PAE is
responsible for communicating with the Supplicant. The Authenticator PAE is also
responsible for submitting the information received from the Supplicant to the Authentication
Server in order for the credentials to be checked, which will determine the authorization state
of the Port. The Authenticator PAE controls the authorized/unauthorized state of the
controlled Port depending on the outcome of the RADIUS-based authentication process.
responsible for communicating with the Supplicant. The Authenticator PAE is also
responsible for submitting the information received from the Supplicant to the Authentication
Server in order for the credentials to be checked, which will determine the authorization state
of the Port. The Authenticator PAE controls the authorized/unauthorized state of the
controlled Port depending on the outcome of the RADIUS-based authentication process.
Supplicant
Supplicant
Authenticator
Switch
Authentication
Server (RADIUS)
192.168.10.23
802.1X Example Configuration
This example shows how to configure the switch so that 802.1X-based authentication is
required on the ports in a corporate conference room (1/0/5 - 1/0/8). These ports are
available to visitors and need to be authenticated before granting access to the network. The
authentication is handled by an external RADIUS server. When the visitor is successfully
authenticated, traffic is automatically assigned to the guest VLAN. This example assumes
that a VLAN has been configured with a VLAN ID of 150 and VLAN Name of Guest.
required on the ports in a corporate conference room (1/0/5 - 1/0/8). These ports are
available to visitors and need to be authenticated before granting access to the network. The
authentication is handled by an external RADIUS server. When the visitor is successfully
authenticated, traffic is automatically assigned to the guest VLAN. This example assumes
that a VLAN has been configured with a VLAN ID of 150 and VLAN Name of Guest.