3com 4210 PWR 9-Port 3CR17341-91-ME 用户手册

产品代码
3CR17341-91-ME
下载
页码 567
17
802.1
X
 C
ONFIGURATION
The online user handshaking function is added. See “Configuring Basic 802.1x 
Functions”.
The configuration of 802.1x re-authentication is added. See “Configuring 
802.1x Re-Authentication”
.
The configuration of the 802.1x re-authentication interval is added. See 
“Configuring the 802.1x Re-Authentication Timer” .
Introduction to 802.1x
The 802.1x protocol (802.1x for short) was developed by IEEE802 LAN/WAN 
committee to address security issues of wireless LANs. It was then used in Ethernet 
as a common access control mechanism for LAN ports to address mainly 
authentication and security problems.
802.1x is a port-based network access control protocol. It authenticates and 
controls devices requesting for access in terms of the ports of LAN access devices. 
With the 802.1x protocol employed, a user-side device can access the LAN only 
when it passes the authentication. Those fail to pass the authentication are denied 
when accessing the LAN.
Architecture of 802.1x 
Authentication
As shown in Figure 65, 802.1x adopts a client/server architecture with three 
entities: a supplicant system, an authenticator system, and an authentication 
server system.
Figure 65   Architecture of 802.1x authentication
The supplicant system is an entity residing at one end of a LAN segment and is 
authenticated by the authenticator system at the other end of the LAN 
segment. The supplicant system is usually a user terminal device. An 802.1x 
authentication is triggered when a user launches client program on the