TP-Link TL-SG2008P Jetstream 8 Port Gigabit Smart Managed PoE Switch

Installation Guide - Page 790

For TL-SG2008P.

PDF File Manual, 1146 pages, Read Online | Download pdf file

Loading ...
Loading ...
Loading ...
User Guide 761
Configuring 802.1x Overview
1
Overview
802.1x protocol is a protocol for port-based Network Access Control. It is used to
authenticate and control access from devices connected to the ports. If the device
connected to the port is authenticated by the authentication server successfully, its
request to access the LAN will be accepted; if not, its request will be denied.
802.1x authentication uses client-server model which contains three device roles: client/
supplicant, authenticator and authentication server. This is described in the figure below:
Figure 1-1 802.1x Authentication Model
Authentication Server
Clients
Switch
Authenticator
â–  Client
A client, usually a computer, is connected to the authenticator via a physical port. We
recommend that you install TP-Link 802.1x authentication client software on the client
hosts, enabling them to request 802.1x authentication to access the LAN.
â–  Authenticator
An authenticator is usually a network device that supports 802.1x protocol. As the above
figure shows, the switch is an authenticator.
The authenticator acts as an intermediate proxy between the client and the authentication
server. The authenticator requests user information from the client and sends it to the
authentication server; also, the authenticator obtains responses from the authentication
server and send them to the client. The authenticator allows authenticated clients to
access the LAN through the connected ports but denies the unauthenticated clients.
â–  Authentication Server
The authentication server is usually the host running the RADIUS server program. It stores
information of clients, confirms whether a client is legal and informs the authenticator whether
a client is authenticated.
Loading ...
Loading ...
Loading ...