802.1x White Paper
802.1x White Paper
Executive Summary
Security and flexibility are often seen as mutually exclusive requirements in a
network, yet both are equally important. Security is crucial on any network. Flexibility,
in particular the ability to roam, is increasingly fundamental.
Contents
A. What Does 802.1x Do? 3
Why Was 802.1x Developed? 3
Network Control Right at the Port Level 3
Authentication, Authorization and Accounting 3
Public Network Security 3
Distribution of Dynamic Encryption Keys 3
The Main Elements of the 802.1x System 4
Supplicant 4
Port 4
Authenticator 4
Extensible Authentication Protocol 4
Extensible Authentication Protocol Over LAN 4
Remote Access Dial In User Service 4
B. An Overview of the 802.1x Standard 6
EAP 6
IEEE 802.1x 6
The Authentication Process 8
EAP Types 8
EAP-MD5 (Message Digest) 8
EAP-OTP 8
Lightweight EAP (LEAP) 9
EAP with Transport Layer Security (EAP-TLS) 9
EAP with Tunneled TLS (EAP-TTLS) and Protected EAP (PEAP) 10
Advanced Features 10
Allocating VLAN Membership 10
Guest VLAN 10
Access Control 10
C. How do Allied Telesis Products Support 802.1X? 11
The IEEE 802.1x standard manages port-based network access. It authenticates devices
attached to a LAN port by initiating a connection and requesting login details. Access is
prevented if authentication fails.
As well as being valuable for authenticating and controlling user traffic to a protected network, 802.1x
is effective for dynamically varying encryption keys. 802.1x attaches the Extensible Authentication
Protocol (EAP) to both wired and wireless LAN media, and supports multiple authentication
methods, such as token cards, one-time passwords, certificates, and public key authentication.
Port
A port is where a device is attached to the LAN, either directly into the switch or a wireless
access point.
Authenticator
The authenticator challenges the supplicant for appropriate authentication before it allows
access to the services available via the port.The authenticator communicates with the
supplicant and submits the information received from the supplicant to a suitable authentication
server. This allows the verification of user credentials to determine the consequent port
authorization state.The authenticator’s functionality is independent of the authentication
method. It acts as a go-between for the supplicant and authentication server.
• Optionally, provides accounting information about how long a user was connected, and
how much data they transferred.
EAP
Because most enterprises want more access security than just the employment of usernames
and passwords, EAP was designed. EAP sits inside the PPP authentication protocol, and
provides a general structure for several different authentication methods. Designed to prevent
several proprietary mechanisms from evolving for the transfer of different authentication types,
EAP enables the smooth operation of everything from passwords to challenge-response tokens
to digital certificates.
IEEE 802.1x
The IEEE 802.1x standard is simply a standard for passing EAP over a wired or wireless LAN,
without PPP. With 802.1x, EAP messages are packaged in Ethernet frames and don’t use
PPP.This is beneficial when the rest of PPP isn’t needed, where protocols other than TCP/IP are
used, or where the overhead and complexity of using PPP is undesirable. 802.1X is especially
well suited for wireless LAN applications as it requires very little processing power on the part
of the Authenticator. In wireless LAN applications, the Authenticator is the Wireless Access
Point (WAP).
4.The supplicant provides its authentication credentials to the authentication server via an
appropriate EAP-Response message.
7.When the supplicant sends an EAPOL-Logoff message to the authenticator the port
under 802.1x control is set to unauthorised.
Port Unauthorised
1 EAPOL - Start
EAP-Request/Identity 1
2 EAPOL - Response/Identitiy
EAP - Request/OTP 3
4 EAPOL - Response/OTP
EAP - Success 5
Port Authorised
EAPOL - Logoff
Port Unauthorised
EAP Types
Various types of EAP have been designed to support authenticators and their related network
security policies.The most widely used EAP types are:
EAP-OTP
EAP-OTP is similar to EAP-MD5, except it uses the One-Time Password (OTP) as the
response.The request contains a displayable message.The OTP mechanism is employed
extensively in VPN and PPP scenarios but not in the wireless world.The OTP method is
defined in RFC 2289.
EAP-TTLS uses the certificate-based, mutual authentication of the client and network through
an encrypted tunnel and dynamic, per-user, per-session WEP keys. Unlike EAP-TLS, EAP-TTLS
requires only server-side certificates.
Like the EAP-TTLS, PEAP authenticates wireless LAN clients using only server-side certificates,
thus simplifying the implementation and administration of a secure wireless LAN. EAP-TTLS
and PEAP are just as safe from sniffing attacks as EAP-TLS.
Advanced Features
Allocating VLAN Membership
In a network environment that contains multiple VLANs, it can be beneficial to assign roaming users
to the same VLAN no matter where they connect to the network.This means that network can
control which VLAN the user is placed on, restricting access to resources and services according to
the user’s profile, irrespective of the physical point at which they connect to the network.
When users move from one part of the office to another, or require the same access in meeting
rooms as they have at their desk, they require either complete access to the network, or restricted
access based on the needs of their job. If different configuration capabilities need to be provided to
staff, contractors and guests, it will to have to be the latter. Fortunately, the following 802.1x
extensions provided by some vendors, including Allied Telesis, offer a solution to this.
Guest VLAN
When visitors are offered an Internet connection so they can reach their own company
network, unlimited access to the host network must be prevented. With the Guest VLAN
feature, if a user tries to connect but doesn't have an 802.1x client, they are migrated to a
Guest VLAN that is set up with limited services (Internet access only, for example).
A failed authentication attempt prevents the user from accessing any VLAN, including the Guest VLAN.
Access Control
The Access Control feature allows you to create access lists (by setting filters) dynamically on a
port depending on who has logged in, access lists can be applied over and above VLAN
membership.This allows the network to be partitioned into zones where similar users are
given similar access. For instance, rate limiting could be applied on the Guest VLAN ports, so
that visitors cannot monopolise the host’s Internet connection.
X900 Series:
AT-9924Ts
24 x 10/100/1000BASE-T (RJ-45) copper ports
2 x 20 Gigabit expansion bays
AT-9924T
24 x 10/100/1000BASE-T copper ports and
4 x 1000BASE-X SFP combo ports
AT-9924T/4SP
24 x 10/100/1000BASE-T copper ports
4 x 1000BASE-X SFP combo ports
High performance IPv6
AT-9924SP
24 x 1000BASE-X SFP ports
AT-8948
4 x 1000BASE-X SFP uplinks
48 x 10/100BASE-T copper ports
SwitchBlade Series:
AT-SB4004
4 line card capacity
Up to 96 Gb ports
AT-SB4008
8 line card capacity
Up to 192 Gb ports
AT-9800 Series:
AT-9816GB V2
16 x 1000BASE-X GBIC ports
AT-9812T V2
12 x 10/100/1000BASE-T copper ports
4 x 1000BASE-X GBIC ports
AT-8800 Series:
AT-8824
24 port 10/100 TX Fast Ethernet
2 GBIC slots
Single PSU (Redundant PSU (RPS) is an optional extra)
PAC connection
AT-8848
48 port 10/100 TX Fast Ethernet
2 GBIC slots
Single PSU (Redundant PSU (RPS) is an optional extra)
PAC connection
Rapier ‘i Series:
Rapier 16fi
16 port 100FX (SC or MT-RJ) Fast Ethernet Layer 3 switch with 2 uplink bays and WAN
access bay
Rapier 24i
24 port 10/100TX Fast Ethernet Layer 3 switch with 2 uplink bays and WAN access bay
Rapier 48i
48 port 10/100TX Fast Ethernet Layer 3 switch with 2 uplink bays
AT-8748XL
48 x 10/100 Layer 2 - Layer 4 with essential
Layer 3 functionality and 2 Uplink Bays
AT-8600 Series:
AT-8624T/2M
24 x 10/100BASE-T + 2 x Uplink Module Bays
Layer 3 switch with Layer 2/3/4+ intelligence
AT-8648T/2SP
48 x 10/100BASE-T Switch
2 x combo ports and
2 x 10/100/1000T uplink ports (RJ-45)*
AT-8624POE
24 x 10/100BASE-T with PoE + 2 x Uplink Module Bays
AT-AR770S
2 x WAN combo ports (100/1000 SFP or 10/100/1000TX)
4 x LAN 10/100/1000TX ports
2 x PIC
1 x Asynchronous console / Modem port
AT-AR750S
2 x WAN 10/100BASE-T ports
5 x LAN 10/100BASE-T ports
2 x PICs
1 x Asynchronous console / Modem port
AT-AR450S
1 x 10/100B-TX WAN port
1 x 10/100B-TX DMZ port/second WAN port
5 x 10/100B-TX LAN ports
2 x asynchronous RS232 ports
AT-AR440
1 x ADSL port
5 x 10/100BASE-T ports
1 x PIC
1 x Asynchronous port
For more information about our products, contact your local Allied Telesis representative or
visit our website: www.alliedtelesis.com
* The RJ-45 ports use the same physical interface as the SFP ports. When an SFP is inserted into an SFP port, the corresponding
RJ-45 port is disabled.