802.1X authentication

This help contains the following topics:

Introduction

802.1X is a port-based network access control protocol that controls access to network resources by authenticating user devices connected to the LAN access device ports.

802.1X architecture

802.1X authentication includes the following entities:

Figure-1 802.1X architecture

802.1X access control methods

The following access control methods are available:

802.1X authentication triggers

Enable the authentication trigger feature on a port when the clients attached to the port cannot send EAPOL-Start packets to initiate 802.1X authentication. The following authentication triggers are available:

Port authorization states

A port supports the following authorization states:

802.1X related features

Periodic reauthentication

Periodic reauthentication enables the access device to periodically authenticate online 802.1X users on a port. This feature tracks the connection status of online users and updates the authorization attributes assigned by the server, such as the ACL and VLAN.

Online user handshake

The online user handshake feature enables the device to periodically send online user handshake packets to the client for verifying the connectivity status of online 802.1X users. The device sets a user to the offline state if it does not receive a response packet from the user after making the maximum attempts within the handshake period.

After the online user handshake feature is enabled, you can enable the online user handshake security feature to prevent online 802.1X users from using illegal client software to interact handshake packets with the device and thereby bypassing security inspection functions of the iNode client, such as proxy detection and dual NIC detection.

Quiet interval

When a client fails 802.1X authentication, the device must wait a period of time before it can process authentication requests from the client.

EAD assistant

Endpoint Admission Defense (EAD) as a network endpoint access control solution strengthens centralized user management and enhances overall network defense through the collaboration of security clients, security policy servers, access devices, and third-party servers. However, in practical applications, deploying EAD clients involves substantial effort. For example, the network administrator must manually download and upgrade the software for each EAD client, which becomes inconvenient when there are many EAD clients.

The EAD assistant feature for 802.1X authentication addresses the issues mentioned above. It allows unauthenticated 802.1X users to access a designated network segment (called free IP), and can redirect HTTP access requests initiated by users to a specific URL within that network segment, enabling automatic downloading and installation of the EAD client.

Configuration guide

Analysis

Configure 802.1X authentication as shown in the following figure:

Figure-2 802.1X authentication configuration flow

Basic configuration

Enable 802.1X authentication

  1. From the left navigation pane, select Configure > AuthN Settings > AuthN Global Settings > 802.1X Authentication.

  2. In the Basic Configuration area, select the 802.1X authentication method as needed:

    • If you select the authentication method as EAP, the device uses the EAP relay mode. In this mode, the device relays EAP packets sent from the client and supports any of the EAP authentication methods to communicate with the RADIUS server.

    • If you select the authentication method as CHAP or PAP, the device uses EAP termination mode. In this mode, the device locally terminates EAP packets sent from the client and supports using CHAP or PAP type authentication methods with a RADIUS server. CHAP transports passwords in encrypted form over the network, while PAP transports passwords in plain text.

  3. Set the domain name delimiter. The configurable delimiters include the at sign (@), backslash (\), dot (.), and forward slash (/).

  4. Click Submit.

Advanced configuration

Configure 802.1X authentication parameters

  1. From the left navigation pane, select Configure > Authentication > Authentication Global Settings > 802.1X Authentication.

  2. In the Advanced Settings area, configure the following parameters as needed:

    Table-1 802.1X authentication parameters

    Parameter

    Description

    Max Authentication Request Attempts

    If the device sends an authentication request packet to a user and does not receive a response within the specified time, the device will retransmit the request packet. If the device has sent the maximum number of authentication requests but still receives no response, it stops sending the authentication request.

    EAD Timeout Interval

    You can control user occupation of ACL resources by configuring the aging time of EAD rules. The timer starts when a user accesses the network, and the ACL resources occupied by the user are deleted either when the timer expires or after the user downloads the client and successfully passes authentication. This promptly releases the ACL resources occupied by users who do not perform any operations within the aging time.

    Handshake Interval

    After successful authentication of a user, the device initiates handshake request packets at this interval to regularly monitor the online status of the user. If you configure the number of transmissions to N, the device considers the user offline if it does not receive a response from the client N consecutive times.

    Quiet Timer

    After a user fails authentication, the device must remain quiet for a period set by the quiet timer. During this quiet period, the device does not process 802.1X authentication for the user who failed 802.1X authentication.

    Periodic Reauthentication Interval

    After periodic reauthentication is enabled on a port, the device initiates reauthentication for online users on the port at this interval. For online 802.1X users, they must wait for the current reauthentication period to end and pass authentication before subsequent reauthentications proceed according to the newly configured interval.

    Authentication Server Timeout Interval

    After the device sends a RADIUS Access-Request packet to the authentication server, it starts a server-timeout timer. If the device does not receive a response from the authentication server within the timeout interval, the 802.1X authentication fails.

    Endpoint Authentication Timeout Interval

    After sending an EAP-Request/MD5 Challenge request packet to a client, the device starts this timer. If the device does not receive a response from the client within the timeout interval, the device will retransmit the packet.

    Username Request Timeout Interval

    After the device sends an EAP-Request/Identity request packet to a client, the device starts the timer. If the device does not receive a response from the client within the set timeout interval, the device will retransmit the request packet. Additionally, to accommodate clients that do not actively send EAPOL-Start packets, the device periodically multicasts EAP-Request/Identity packets to detect clients.

  3. Click Submit.

Configure EAD assistant

  1. From the left navigation pane, select Configure > Authentication > Authentication Global Settings > 802.1X Authentication.

  2. In the Advanced Settings area, turn on EAD assistant.

  3. Configure the Free IP Subnet Before Passing 802.1X Authentication and Redirect URL for HTTP Access Before Passing 802.1X Authentication parameters.

  4. Click Submit.

Example: Configure RADIUS-based 802.1X authentication

Network configuration

Configure the AC to perform 802.1X authentication on wireless users for Internet access control. This example uses the following settings:

Figure-3 Network diagram

Procedure

Configure a RADIUS scheme

  1. From the left navigation pane, select Configure > Authentication > AAA Settings > RADIUS Settings. The RADIUS Schemes page is displayed.

  2. Click Add. On the page that opens, add a RADIUS scheme:

    • Configure the RADIUS scheme name as 802.1X.

    • Configure the primary authentication server. Set its IP address to 10.1.1.1, port number to 1812, and shared key to name.

    • Configure the primary accounting server. Set its IP address to 10.1.1.1, port number to 1813, and shared key to name.

    • Click Submit.

    Figure-4 RADIUS scheme basic configuration

  3. In the Advanced Configuration area for RADIUS scheme 802.1X, select With Domain Names from the Format for Usernames Sent to RADIUS Server list. Use the default settings for the other parameters.

  4. Click Submit.

    Figure-5 RADIUS scheme advanced configuration

Configure an ISP domain

  1. From the left navigation pane, select Configure > Authentication > AAA Settings > ISP Domains. The ISP Domain Settings page is displayed.

  2. Click Add. On the page that opens, add an ISP domain:

    • Configure the ISP domain name as 1X.

    • Select RADIUS Scheme for authentication, authorization, and accounting and select 802.1x as the scheme for each of them.

    • Click Submit.

    Figure-6 Configure an ISP domain

Configuring 802.1X

  1. From the left navigation pane, select Configure > Authentication > Authentication Global Settings > 802.1X Authentication.

  2. In the Basic Configuration area, configure the 802.1X authentication method as EAP, and configure the domain name delimiter @.

  3. Click Submit.

Figure-7 Configuring 802.1X

Configure the RADIUS server

Add user accounts on the RADIUS server and make sure it can provide authentication, authorization, and accounting services. (Details not shown.)

Verify the configuration

Launch the 802.1X client, and then enter the correct username and password. You can successfully pass authentication and come online.