Specifications

Why Would I Use It in My Network?
April 15, 2011 Page 2 of 36
ConvergenceEndPoint(CEP)
•RADIUSSnooping
Enterasysswitchproductssupporttheconfigurationofuptothreesimultaneousauthentication
methodsperuser,withasingleauthenticationmethodappliedbaseduponMultiAuth
authenticationprecedence.
Why Would I Use It in My Network?
Networkresourcesrepresentamajorcapitalinvestmentforyourorganizationandcanbe
vulnerabletobothundesiredresourceusageandmaliciousintentfromoutsideusers.
Authenticationprovidesyouwithauservalidationfunctionwhichassuresthatthesupplicant
requestingaccesshastherighttodosoandisaknownentity.
Tothe degreeasupplicantisnota
knownentity,accesscanbedeniedorgrantedonalimitedbasis.Theabilityofauthenticationto
bothvalidateausersidentityanddefinetheresourcesavailabletotheuserassuresthatvaluable
networkresourcesarebeingusedfor thepurposesintended
bythenetworkadministrator.
How Can I Implement User Authentication?
Takethefollowingstepstoimplementuserauthentication:
Determinethetypesofdevicestobeauthenticated.
Determinethecorrectauthenticationtypeforeachdevice.
Determineanappropriatepolicybestsuitedfortheuseofthatdeviceonyournetwork.
ConfigureRADIUSuseraccountsontheauthenticationserverforeachdevice.
Configureuserauthentication.
Authentication Overview
Note: The RADIUS Snooping user authentication feature is detailed in the Configuring RADIUS
Snooping feature guide. The RADIUS Snooping feature guide can be found at:
https://extranet.enterasys.com/downloads.
Note: See the Enterasys Matrix X Core Router Configuration Guide for X-Series switch
authentication configuration information.
For information about... Refer to page...
IEEE 802.1x Using EAP 3
MAC-Based Authentication (MAC) 3
Port Web Authentication (PWA) 3
Convergence End Point (CEP) 4
Multi-User And MultiAuth Authentication 4
Remote Authentication Dial-In Service (RADIUS) 8