Chapter 16 - IEEE 8021X
Chapter 16 - IEEE 8021X
Chapter 16 - IEEE 8021X
1X
1
DEFINITION
3
FUNCTION OF PBNAC
4
PBNAC
5
WHAT IS IEEE 802.1X ?
IEEE 802.1x is the IEEE standard for Port based Network
Access Control.
It provides an authentication mechanism to devices
attaching to LAN or WLAN infrastructure.
IEEE 802.1x defines the encapsulation of the Extensible
Authentication Protocol over Ethernet type networks.
Works between the supplicant and the authenticator.
6
WHY IEEE 802.1X ?
8
802.1X authentication involves three entities;
9
1. Supplicant:
• requests to connect to a LAN
2. Authenticator:
• responsible for initiating the authentication process
• Acting as a relay between the authentication server and
the supplicant
3. Authentication server:
• responsible for doing the actual authentication &
authorization
10
PAE (PORT ACCESS ENTITY)
The Port Access Entity (PAE) operates the algorithms and protocols associated
with the authentication mechanisms for a given Port of the System.
In the Supplicant role, the PAE is responsible for responding to requests from an
Authenticator for information that will establish its credentials. The PAE that
performs the Supplicant role in an authentication exchange is known as the
Supplicant PAE.
In the Authenticator role, the PAE is responsible for communication with the
Supplicant, and for submitting the information received from the Supplicant to a
suitable Authentication Server in order for the credentials to be checked and for
the consequent authorization state to be determined.
12
TERMS IN ARCHITECTURE
14
15
16
SEQUENCE DIAGRAM OF 802.1X PROGRESSION
Explanation:
The authenticator sends an EAP request packet to the
supplicant.
The supplicant sends an EAP packet to the authenticator.
The authenticator sends a packet to radius server
The radius server challenges the authenticator with a token or
password.
17
CONTD..
18
AUTHENTICATION USING EAP
19
PORT BASED NETWORK ACCESS
CONTROL APPLICATIONS
Host access using individual, physically secure, point-to-point
LANs
Infrastructure support with physically secure, point-to-point
LANs
Host access using MAC and point-to-point or multi-access
LANs
Infrastructure LANs using MAC
Group host access using MAC
20
Virtual shared media infrastructure LANs using MAC
REFERENCES
21
THANK YOU !
22