LogoLogo
  • EWS Series User Manual
  • Product Overview
    • Introduction
    • LED Behavior
    • Comparison Table
    • Technical Specification
  • Getting Started
    • Management Interface
    • Connecting the Switch
  • Wireless Controller Features
    • Managing EnSky Access Points
    • Device Management
      • Access Points
      • Access Point Settings
      • AP Groups
      • Wireless Services
    • Monitor
      • Active Clients
      • Rogue AP Detection
      • System Log
      • Email Alert
    • Visualization
      • Topology View
      • Map View
      • Floor View
      • Mesh View
    • Statistics
      • Access Points
      • Wireless Clients
      • Real-Time Throughput
    • Hotspot Services
      • Captive Portal
      • Guest Account
    • Mesh
      • Mesh Profile
      • Node List
      • Mesh Tools
      • Isolated Nodes
    • Maintenance
      • Schedule Tasks
      • Troubleshooting
      • Bulk Upgrade
      • One-click Update
      • SSL Certificate
      • Check Codes
  • Ethernet Switch Features
    • System
      • Summary
      • Network Settings
      • System Time
      • Port Settings
      • PoE
      • EEE
    • L2 Features
      • Link Aggregtion
      • STP
      • MAC Address Table
      • LLDP
      • IGMP Snooping
      • MLD Snooping
      • Jumbo Frame
    • VLAN
      • 802.1Q
      • PVID
      • Voice VLAN
    • Management
      • System Information
      • User Management
      • Dual Image
      • SNMP
    • ACL
      • MAC ACL
      • MAC ACE
      • IPv4 ACL
      • IPv4 ACE
      • IPv6 ACL
      • IPv6 ACE
      • ACL Binding
    • QoS
      • Global Settings
      • CoS Mapping
      • DSCP Mapping
      • Port Settings
      • Bandwidth Control
      • Storm Control
    • Security
      • 802.1x
      • Radius Server
      • Access
      • Port Security
      • Port Isolation
      • DoS
    • Monitoring
      • Port Statistics
      • RMON
      • Log
    • Diagnostics
      • Cable Diagnostics
      • Ping Test
      • IPv6 Ping Test
      • Trace Route
    • Maintenance
      • Configuration Manager
      • Firmware Upgrade
  • Appendix
    • Appendix A
    • Appendix B
    • Appendix C
Powered by GitBook
On this page

Was this helpful?

Export as PDF
  1. Ethernet Switch Features

Security

The IEEE 802.1X standard authentication uses the RADIUS (Remote Authentication Dial in User Service) protocol to validate users and provide a security standard for network access control. The user that wishes to be authenticated is called a supplicant. The actual server doing the authentication, typically a RADIUS server, is called the authentication server. The mediating device, such as a switch, is called the authenticator. Clients connected to a port on the switch must be authenticated by the Authentication server (RADIUS) before accessing any services offered by the switch on the LAN. Use a RADIUS server to authenticate users trying to access a network by relaying Extensible Authentication Protocol over LAN (EAPOL) packets between the client and server. This establishes the requirements needed for a protocol between the authenticator (the system that passes an authentication request to the authentication server) and the supplicant (the system that requests authentication), as well as between the authenticator and the authentication server.

PreviousStorm ControlNext802.1x

Last updated 4 years ago

Was this helpful?