D-Link DSL-G604T Switch User Manual


 
DGS-3024 Gigabit Ethernet Switch Manual
Client
The Client is simply the workstation that wishes to gain access to the LAN or Switch services. All workstation must be
running software that is compliant with the 802.1x protocol. For users running Windows XP, the software is included within
the operating system. All other users are required to attain 802.1x client software from an outside source. The Client will
request access to the LAN and or Switch through EAPOL packets and, in turn will respond to requests from the Switch.
Figure 7- 52. Client
Authentication Process
Utilizing the three components stated above, the 802.1x protocol provides a stable and secure way of authorizing and
authenticating users attempting to access the network. Only EAPOL traffic is allowed to pass through the specified port
before a successful authentication is made. This port is “locked” until the point when a Client with the correct username and
password is granted access and therefore successfully “unlocks” the port. Once unlocked, normal traffic is allowed to pass
through the port. The implementation of 802.1x allows network administrators to choose Port-Based Access Control. This
method requires only one user to be authenticated per port by a remote RADIUS server to allow the remaining users on the
same port access to the network.
Port-Based Network Access Control
The original intent behind the development of 802.1x was to leverage the characteristics of point-to-point in LANs. Any
single LAN segment in such an infrastructures has no more than two devices attached to it, one of which is a Bridge Port.
The Bridge Port detects events that indicate the attachment of an active device at the remote end of the link, or an active
device becoming inactive. These events can be used to control the authorization state of the Port and initiate the process of
authenticating the attached device if the Port is unauthorized. This is the Port-Based Network Access Control.
76