DES-3550 Fast Ethernet Layer 2 Switch
Figure 6- 65. EAPOL Packet
Utilizing this method, unauthorized devices are restricted from connecting to a LAN through a port to which the user is
connected. EAPOL packets are the only traffic that can be transmitted through the specific port until authorization is
granted. The 802.1x Access Control protocol consists of three components, each of which is vital to creating and
maintaining a stable and working Access Control security method.
Figure 6- 66. Three Functions of 802.1x
The following section will explain Client, Authenticator, and Authentication Server in greater detail.
Authentication Server
The Authentication Server is a remote device that is connected to the same network as the Client and Authenticator, must
be running a RADIUS Server program and must be configured properly on the Authenticator (Switch). Clients connected
to a port on the Switch must be authenticated by the Authentication Server (RADIUS) before attaining any services offered
by the Switch on the LAN. The role of the Authentication Server is to certify the identity of the Client attempting to access
the network by exchanging secure information between the RADIUS server and the Client through EAPOL packets and, in
turn, informs the Switch whether or not the Client is granted access to the LAN and/or switch services.
97