Specifications

Waters Network Systems User’s Manual Page 78
PS-2126M-POE
Figure 5.42 – LACP System Configuration
5.18 802.1X Configuration
802.1X port-based network access control provides a method to restrict users to access
network resources via authenticating user’s information. This restricts users from gaining access
to the network resources through a 802.1X-enabled port without authentication. To access the
network through a port under 802.1X control, you must first input your account name for
authentication and wait to gain authorization before sending or receiving any packets from a
802.1X-enabled port.
Before the devices or workstations can access the network resources through the ports under
802.1X control, the devices or workstations must send an authentication request to the
authenticator. The authenticator passes the request to the authentication server to authenticate
and verify, and the server informs the authenticator to grant the request for authorization for the
ports.
According to IEEE 802.1X, there are three components are implemented:
Supplicant
Authenticator
Authentication server shown in Figure 5.43.
Supplicant:
An entity authenticated by an authenticator. Used to communicate with the Authenticator PAE
(Port Access Entity) by exchanging the authentication message when the Authenticator PAE
performs a request.
Authenticator:
An entity facilitates the authentication of the supplicant entity. It controls the state of the port,
authorized or unauthorized, according to the result of authentication message exchanged
between it and a supplicant PAE. The authenticator may request the supplicant to re-
authenticate itself at a configured time period. Once re-authenticating has begun, the