Skip to Content
JUNOS Enterprise Switching
book

JUNOS Enterprise Switching

by Harry Reynolds, Doug Marschke
July 2009
Intermediate to advanced
752 pages
23h 19m
English
O'Reilly Media, Inc.
Content preview from JUNOS Enterprise Switching

IEEE 802.1X Port-Based Authentication

The IEEE 802.1X standard defines port-based NAC. In English, this means the protocol authenticates users on a per-switch port (or Wireless Access Point [WAP]) basis, allowing access for valid users and effectively disabling the port when authentication fails. The 802.1X standard relies on EAP for its heavy lifting; EAP is currently defined in RFC 3748. 802.1X is most often associated with WAPs, for the obvious reason that a wireless infrastructure, by its very nature, opens itself up to any and all takers, and hence may want to authenticate users before allowing them in. That being said, there is no reason that what is good for a wireless network cannot also be a benefit for a wired infrastructure. For example, you may have wall jacks that are in an unsecured area in a public meeting room that is shared by internal users and external guests, and you would like to offer intranet and Internet access to the former, but only Internet access to the latter.

802.1X does not replace other security technologies. 802.1X works with port security features such as DHCP snooping, DAI, and MAC limiting to guard against DoS attacks and spoofing.

Terminology and Basic Operation

Before diving into the 802.1X configuration and verification lab, let’s review some basic terminology and operational concepts. Figure 9-3 illustrates basic 802.1X concepts and EAP operation.

Figure 9-3. IEEE 802.1X basics

An 802.1X authentication system contains three basic components:

Supplicant ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

JUNOS Enterprise Routing

JUNOS Enterprise Routing

Doug Marschke, Harry Reynolds
JUNOS High Availability

JUNOS High Availability

James Sonderegger, Orin Blomberg, Kieran Milne, Senad Palislamovic
Junos Security

Junos Security

Rob Cameron, Brad Woodberg, Patricio Giecco, Timothy Eberhard, James Quinn

Publisher Resources

ISBN: 9780596804244Errata Page