WebllenaWebllena
  • Home
  • Reviews
    • Key Specs
  • Blog
  • IT Tips
  • IT Info
  • Software-App
  • Communication
    • Car-Tech News
  • Web-marketing
    • About
    • Privacy Policy
Reading: Securing a Local Network Infrastructure Using IEEE 802.1x
Share
Aa
WebllenaWebllena
Aa
  • Home
  • Reviews
  • IT Tips
  • IT Info
  • Software-App
Search
  • Home
  • Reviews
    • Key Specs
  • Blog
  • IT Tips
  • IT Info
  • Software-App
  • Communication
    • Car-Tech News
  • Web-marketing
    • About
    • Privacy Policy
Follow US

Home » Communication » Securing a Local Network Infrastructure Using IEEE 802.1x

Communication

Securing a Local Network Infrastructure Using IEEE 802.1x

Last updated: 2018/02/05 at 3:26 PM
Admin Published March 29, 2017 February 5, 2018
Share
SHARE

The 802-LAN/MAN-Standardization Committee of the Institute of Electrical and Electronics Engineers (IEEE) develops standards for Local Area Networks (LAN) and Metropolitan Area Networks IEEE-802 protocol (MAN) . The most widely used standards are those of the Ethernet suite suite (IEEE 802.3), the Token-Ring (802.5) and the 802.11 series standards for wireless LANs (WLAN) .

For the security of access to such networks a subgroup of the 802 committee is working on a standard labelled IEEE 802.1x [IEE01] that aims to restrict access to LAN services to those users or devices with proper authorization. This standard can basically be used with diverse technologies of the 802 series.SecuringLocal Network

The basic characteristic of the standard is port-based access control control , which is used to perform authentication and authorisation of devices connected to LAN ports. A LAN port is a logical access point with point-to-point connection characteristics. It could be the access port of a Fast-Ethernet switch or the logical access point of a WLAN base station. The IEEE 802.1x standard conceptually distinguishes between two logical ports (also see Figure 10.1): an uncontrolled port, which enables a device to prove its identity through an authentication exchange, and a controlled port, which allows proven authenticated devices to access the general data transmission service of the local area network.

Three principal roles are distinguished in the authenticity verification of connected devices:

– A device that wants access to the data transmission service of the local area network finds itself in the role of supplicant when it is providing and proving its identity during the authentication exchange.

– The access point of the LAN infrastructure, such as an Ethernet-Switch, functions as an authenticator demanding that a device provide and prove its identity.

– The authenticator does not itself verify the credentials provided by a supplicant during the authentication exchange. Instead, it forwards them to an authentication server that then notifies it of the results of the authentication verification. Prior to a device’s successful authentication of itself to the authenticator of a local area network, it only has access to an uncontrolled port. This port is uncontrolled in the sense that it can be accessed even before authentication has been successfully performed. However, it only allows authentication message exchange and cannot be used for the transmission of arbitrary data units. An authentication exchange can be initiated by a supplicant as well as by an authenticator. The controlled port is opened as soon as the exchange is successfully completed.

For the exchange of EAP protocol data units IEEE 802.1x specifies the protocol EAP over LANs (EAPOL), which mainly defines techniques for the encapsulation of EAP-PDUs into the payload of transmission frames of the 802 protocol suite. The encapsulated PDUs are then exchanged between the Port Access Entities (PAE) of the supplicant and the authenticator. Conventional RADIUS messages can be used between the authenticator and the authentication server. In summary it should be noted that IEEE 802.1x primarily access control for LANs provides access control for the transmission services offered by local area networks. However, the standard does not define how to secure actual data transmission from passive or active attacks and additional security protocols are therefore required.

TAGGED: IEEE, LAN port, Local Area Networks
Share this Article
Facebook Twitter Pinterest Reddit Email Print
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Garmin DriveSmart™ 66
What is the difference between Garmin drive and DriveSmart?
Reviews
Fix Windows Boot Loop
How to Fix Windows Boot Loop Issues?
IT Tips
OpenEMR
4 FREE medical Software for healthcare providers
Software-App

You Might Also Like

What is a Video Podcast
Communication

Why and How To Launch a Video Podcast?

January 4, 2023 January 4, 2023
What is WiFi 7
Communication

When will WiFi 7 be distributed? What is WiFi 7?

November 6, 2022 November 6, 2022
Security Issue with Home Wi-Fi Routers
Communication

Identifying the Security Issue with Home Wi-Fi Routers

November 6, 2022 November 6, 2022
navigation system
Communication

In-dash or portable navigation? What advantages can a navigation system offer?

September 5, 2022 September 5, 2022
5G
Communication

The benefits and favorable circumstances of 5G

February 8, 2022 December 10, 2022
voip
Communication

Traditional Phones or VOIP Phone Handsets

October 27, 2021 October 27, 2021
Asus ZenWiFi AX XT8
Communication

Mesh Router System – Advantages

October 21, 2021 February 1, 2023
Wi-Fi router
Communication

A few tips before you buy a Wi-Fi router

October 17, 2021 October 17, 2021

Recent Posts

  • What is the difference between Garmin drive and DriveSmart?
  • How to Fix Windows Boot Loop Issues?
  • 4 FREE medical Software for healthcare providers
  • I can’t use wireless to access my network storage?
  • Motherboard BIOSTAR Z790A-SILVER – Digital PWM, SMART BIOS Update…
Fix Windows Boot Loop
How to Fix Windows Boot Loop Issues?
IT Tips
vlc
VLC not casting to Chromecast – Tips
IT Tips
BenQ TK850i
What exactly is a Laser Projector?
IT Tips
Network Storage
I can’t use wireless to access my network storage?
IT Tips

Categories

  • Car-Tech News
  • Communication
  • IT Info
  • IT Tips
  • Key Specs
  • Reviews
  • Software-App
  • Web-marketing
© Copyright 2012 - 2023 Webllena.com

We are using cookies to give you the best experience on our website.

You can find out more about which cookies we are using or switch them off in settings.

Welcome Back!

Sign in to your account

Lost your password?
Webllena
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.