Results 1 to 6 of 6

Thread: Analytical methods to achieve 802.1x authentication

  1. #1
    Join Date
    Feb 2010
    Posts
    184

    Analytical methods to achieve 802.1x authentication

    Hi all,

    802.1x for the IEEE Std 802.1x-2001 port-based access control agreement, I can overcome many problems caused by PPPoE mode, and avoid the introduction of broadband access Servers Arising from the huge investment. 802.1x agreement restrict unauthorized users / devices to access through the access port LAN / WAN. Obtained Exchange Machine or LAN to provide a variety of business before, 802.1x right to connect to the Exchange Local port on the user authentication. I want to know that analytical methods to achieve 802.1x authentication. Please suggest. Thanks in advance.

  2. #2
    Join Date
    Feb 2008
    Posts
    2,635

    Analytical methods to achieve 802.1x authentication

    Before the adoption of the certification, 802.1x allows only EAPOL (Extensible Authentication based on LAN Agreement) Data device connected through the switch port. After certification, the normal data can be smoothly through the Ethernet port. 802.1x protocol architecture consists of three major parts: Supplicant System Client, Authenticator System Authentication System, Authentication Server System certification servers. The client system is generally a user terminal system, the terminal system is usually to install a client software, users start the client software through the IEEE 802.1x protocol to launch the certification process. To support port-based access control, client systems must support EAPOL protocol. Windows XP operating system already contains the 802.1x authentication client software. Check and reply.

  3. #3
    Join Date
    May 2008
    Posts
    2,945

    Re: Analytical methods to achieve 802.1x authentication

    Authentication server is usually radius server, the server can store the user's information, such as the user belongs to VLAN, CAR parameters, priority, user's access control list. When the user authentication, the authentication server will pass the relevant information the user authentication system, authentication system built by the dynamic access control list, the user's acceptance of these parameters will be the follow-up traffic control. Authentication server and the radius server to communicate through the EAP protocol. Check and reply.

  4. #4
    Join Date
    Jan 2006
    Posts
    3,792

    Analytical methods to achieve 802.1x authentication

    At present, most manufacturers of access switches support 802.1x protocol, and some also support local authentication, which makes set aside radius server, the access switch on the user authentication is possible. Quidway S3026 below for an example, using built-in radius server to implement user authentication on the access switch. All the best.

  5. #5
    Join Date
    Jan 2006
    Posts
    4,221

    Analytical methods to achieve 802.1x authentication

    You can directly use the existing configuration of building certification services.
    # Open the 802.1x function
    [Quidway] dot1x
    # Specify the port on the open 802.1X
    [Quidway] dot1x interface eth 0 / 1 to eth 0 / 24
    # Add User
    [Quidway] local-user sample
    [Quidway-luser-sample] password simple 123456
    [Quidway-luser-sample] service-type lan-access
    We can also create a new domain to carry out 802.1x authentication.
    # Open the 802.1x function
    [Quidway] dot1x

    Check and reply.

  6. #6
    Join Date
    Apr 2008
    Posts
    3,339

    Analytical methods to achieve 802.1x authentication

    IEEE802.1x agreement layer protocol does not need to reach three-tier, in the second tier of the switch to achieve 802.1x authentication, are in line with the agreement features; and because the separation of operational and certification through the certification after the packet is no need to package pure data packets exchanged directly through the controlled port, greatly improving network performance, reliability. If combined with MAC, port and VLAN, etc. bind technology will enable the network has a very high. Check and reply.

Similar Threads

  1. The trophies which you can achieve for this year
    By Aag-Man in forum Video Games
    Replies: 5
    Last Post: 16-07-2011, 10:50 AM
  2. Can't achieve 6GB/s with sata 3 HHDs
    By Aadidev in forum Hardware Peripherals
    Replies: 4
    Last Post: 19-06-2011, 06:25 AM
  3. How to achieve Multithreading in Java
    By LasitMalinga in forum Software Development
    Replies: 3
    Last Post: 02-05-2009, 01:09 PM
  4. Download Whocrashed, Blue Screens Analytical Tool
    By Philip21 in forum Operating Systems
    Replies: 3
    Last Post: 16-03-2009, 02:33 PM
  5. How to achieve the recovery partition?
    By GNom in forum Operating Systems
    Replies: 3
    Last Post: 24-02-2009, 12:24 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,713,486,125.77113 seconds with 16 queries