Netgear M6100 – Campus Edge and SMB Core Chassis Switches ユーザーガイド

ページ / 564
 Configuration Examples
555
 M6100 Web Management User Guide
is connected can be desirable in order to restrict access to publicly accessible bridge ports or 
to restrict access to departmental LANs.
Access control is achieved by enforcing authentication of supplicants that are attached to an 
authenticator's controlled ports. The result of the authentication process determines whether 
the supplicant is authorized to access services on that controlled port.
A Port Access Entity (PAE) is able to adopt one of two distinct roles within an access control 
interaction:
1. 
Authenticator
: A Port that enforces authentication before allowing access to services 
available via that Port.
2. 
Supplicant
: A Port that attempts to access services offered by the Authenticator.
Additionally, there exists a third role:
3. 
Authentication server
: Performs the authentication function necessary to check the 
credentials of the Supplicant on behalf of the Authenticator.
All three roles are required in order to complete an authentication exchange.
M6100 Managed Chassis switches support the Authenticator role only, in which the PAE is 
responsible for communicating with the Supplicant. The Authenticator PAE is also 
responsible for submitting the information received from the Supplicant to the Authentication 
Server in order for the credentials to be checked, which will determine the authorization state 
of the Port. The Authenticator PAE controls the authorized/unauthorized state of the 
controlled Port depending on the outcome of the RADIUS-based authentication process.
Supplicant
Supplicant
Authenticator
Switch
Authentication
Server (RADIUS)
192.168.10.23
802.1X Example Configuration
This example shows how to configure the switch so that 802.1X-based authentication is 
required on the ports in a corporate conference room (1/0/5 - 1/0/8). These ports are 
available to visitors and need to be authenticated before granting access to the network. The 
authentication is handled by an external RADIUS server. When the visitor is successfully 
authenticated, traffic is automatically assigned to the guest VLAN. This example assumes 
that a VLAN has been configured with a VLAN ID of 150 and VLAN Name of Guest.