Справочник Пользователя для Enterasys Networks E1 Series

Скачать
Страница из 808
Working with Security Configurations
802.1X Port Based Network Access Control Overview
14-114
14.4.2 802.1X Port Based Network Access Control Overview
When using the physical access characteristics of IEEE 802 LAN infrastructures, the 802.1X 
standard provides a mechanism for administrators to securely authenticate and grant appropriate 
access to end user devices directly attached to Matrix E1 device ports. When configured in 
conjunction with NetSight Policy Manager and RADIUS server(s), Enterasys Networks’ Matrix E1 
devices can dynamically administer user based policy that is specifically tailored to the end user’s 
needs. 
The device supports 802.1X security and authentication features to:
Authenticate hosts that are connected to dedicated switch ports.
Authenticate based on single-user hosts. (If a host is a time-shared Unix or VMS system, 
successful authentication by any user will allow all users access to the network.)
Allow users to authenticate themselves by logging in with user names and passwords, token 
cards, or other high-level identification. Thus, a system manager does not need to spend hours 
setting low-level MAC address filters on every edge switch to simulate user-level access 
controls. 
Divide system functionality between supplicants (user machines), authenticators, and 
authentication servers. Authenticators reside in edge switches. They shuffle messages and tell 
the switch when to grant or deny access, but do not validate logins. User validation is the job of 
authentication servers. This separation of functions allows network managers to put 
authentication servers on central servers. 
Use EAPOL to communicate between the authenticator (switch) and the authentication server. 
For more information on configuring EAPOL on the device, refer to 
14.4.3 MAC Authentication Overview
MAC authentication allows secure network access by validating the MAC addresses of authorized 
user devices connected to MAC authentication-enabled ports. Network management statically 
provisions MAC addresses in a central RADIUS server, which allows those pre-configured MAC 
addresses network access the usual RADIUS validation process. This section describes how MAC 
authentication and 802.1X cooperate to provide an integrated approach to authentication.