SlideShare a Scribd company logo
1 of 8
IEEE 802.1x
Authentication
  Standard:
Terms:
 Supplicant - The User or Client to be
  authenticated
 Radius Server – The Server doing the
  authentication
 Authenticator – The device between the
  Supplicant & the Radius Server
 EAPOL – (Extensible Authentication
  Protocol Over LANs)
How it Works:
 The Authenticator sends an EAP request
  packet to the Supplicant.
 The Supplicant sends an EAP packet to
  the Authenticator.
 The Authenticator sends a packet to the
  Radius Server.
 The Radius Server challenges the
  Authenticator with a token or password.
How it Works: continued…
 The  Authenticator changes it from the IP
  to EAPOL.
 The Supplicant responds to the challenge
  and passes it to the Authentication Server.
 If there’s a successful challenge, then the
  Authentication Server responds with a
  success message allowing access to the
  LAN.
Example:
Key Aspects:
 Supplicant   = End station software

 Authenticator   = Wired switch or SSID

 AuthenticationServer = Ensures certificate
 or passwords are correct
Benefits:
 IEEE
     Standard 98% of all switches support
 802.1x

 Good   authentication

 ‘Pre-connect’   enforcement of access
 policies
Drawbacks:
 Incompatibilities   with certain switches

 Some    security issues

 Tough   to deploy

 Does   not have a ‘post-connect’

More Related Content

What's hot

802.1x Implementation Plan for Seacoast
802.1x Implementation Plan for Seacoast802.1x Implementation Plan for Seacoast
802.1x Implementation Plan for Seacoast
Sithideth Banavong
 
Ap&ac system development 2014
Ap&ac system development 2014Ap&ac system development 2014
Ap&ac system development 2014
TOM LIU
 

What's hot (20)

802.1x Implementation Plan for Seacoast
802.1x Implementation Plan for Seacoast802.1x Implementation Plan for Seacoast
802.1x Implementation Plan for Seacoast
 
radius dhcp dot1.x (802.1x)
radius dhcp dot1.x (802.1x)radius dhcp dot1.x (802.1x)
radius dhcp dot1.x (802.1x)
 
IEEE 802.1X and Axis’ Implementation
IEEE 802.1X and Axis’ ImplementationIEEE 802.1X and Axis’ Implementation
IEEE 802.1X and Axis’ Implementation
 
Iuwne10 S03 L02
Iuwne10 S03 L02Iuwne10 S03 L02
Iuwne10 S03 L02
 
AAA & RADIUS Protocols
AAA & RADIUS ProtocolsAAA & RADIUS Protocols
AAA & RADIUS Protocols
 
Iuwne10 S02 L02
Iuwne10 S02 L02Iuwne10 S02 L02
Iuwne10 S02 L02
 
8021x feature config_guide
8021x feature config_guide8021x feature config_guide
8021x feature config_guide
 
Iuwne10 S02 L06
Iuwne10 S02 L06Iuwne10 S02 L06
Iuwne10 S02 L06
 
Implementing Cisco AAA
Implementing Cisco AAAImplementing Cisco AAA
Implementing Cisco AAA
 
Ap&ac system development 2014
Ap&ac system development 2014Ap&ac system development 2014
Ap&ac system development 2014
 
EMEA Airheads- ClearPass extensions and how they can help
EMEA Airheads-  ClearPass extensions and how they can helpEMEA Airheads-  ClearPass extensions and how they can help
EMEA Airheads- ClearPass extensions and how they can help
 
AAA in a nutshell
AAA in a nutshellAAA in a nutshell
AAA in a nutshell
 
EMEA Airheads- Getting Started with the ClearPass REST API – CPPM
EMEA Airheads-  Getting Started with the ClearPass REST API – CPPMEMEA Airheads-  Getting Started with the ClearPass REST API – CPPM
EMEA Airheads- Getting Started with the ClearPass REST API – CPPM
 
Cisco acs configuration guide
Cisco acs configuration guideCisco acs configuration guide
Cisco acs configuration guide
 
ClearPass Insight 6.3 User Guide
ClearPass Insight 6.3 User GuideClearPass Insight 6.3 User Guide
ClearPass Insight 6.3 User Guide
 
ClearPass Policy Model - An Introduction
ClearPass Policy Model - An IntroductionClearPass Policy Model - An Introduction
ClearPass Policy Model - An Introduction
 
10 steps for troubleshooting wi fi
10 steps for troubleshooting wi fi10 steps for troubleshooting wi fi
10 steps for troubleshooting wi fi
 
Iuwne10 S02 L05
Iuwne10 S02 L05Iuwne10 S02 L05
Iuwne10 S02 L05
 
Iuwne10 S03 L01
Iuwne10 S03 L01Iuwne10 S03 L01
Iuwne10 S03 L01
 
EMEA Airheads- Troubleshooting 802.1x issues
EMEA Airheads- Troubleshooting 802.1x issuesEMEA Airheads- Troubleshooting 802.1x issues
EMEA Airheads- Troubleshooting 802.1x issues
 

Viewers also liked

Ieee 802.1 x
Ieee 802.1 xIeee 802.1 x
Ieee 802.1 x
matoko
 
étude de cas Cisco
étude de cas Ciscoétude de cas Cisco
étude de cas Cisco
anoucktr
 
NT320-Final White Paper
NT320-Final White PaperNT320-Final White Paper
NT320-Final White Paper
Ryan Ellingson
 
Alphorm.com Support de la Formation Cisco CCNP SWITCH (examen 300-115)
Alphorm.com Support de la Formation Cisco CCNP SWITCH (examen 300-115)Alphorm.com Support de la Formation Cisco CCNP SWITCH (examen 300-115)
Alphorm.com Support de la Formation Cisco CCNP SWITCH (examen 300-115)
Alphorm
 

Viewers also liked (20)

Ieee 802.1 x
Ieee 802.1 xIeee 802.1 x
Ieee 802.1 x
 
Identity Services Engine Overview and Update
Identity Services Engine Overview and UpdateIdentity Services Engine Overview and Update
Identity Services Engine Overview and Update
 
Demystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISEDemystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISE
 
étude de cas Cisco
étude de cas Ciscoétude de cas Cisco
étude de cas Cisco
 
Openeye Radius Overview
Openeye Radius OverviewOpeneye Radius Overview
Openeye Radius Overview
 
Ieee 802.1 x
Ieee 802.1 xIeee 802.1 x
Ieee 802.1 x
 
ISE-802.1X-MAB
ISE-802.1X-MABISE-802.1X-MAB
ISE-802.1X-MAB
 
NT320-Final White Paper
NT320-Final White PaperNT320-Final White Paper
NT320-Final White Paper
 
Cisco identity services engine (ise) ordering steps & guide
Cisco identity services engine (ise) ordering steps & guideCisco identity services engine (ise) ordering steps & guide
Cisco identity services engine (ise) ordering steps & guide
 
Radius server,PAP and CHAP Protocols
Radius server,PAP and CHAP ProtocolsRadius server,PAP and CHAP Protocols
Radius server,PAP and CHAP Protocols
 
RADIUS
RADIUSRADIUS
RADIUS
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE
 
Real-world 802.1X Deployment Challenges
Real-world 802.1X Deployment ChallengesReal-world 802.1X Deployment Challenges
Real-world 802.1X Deployment Challenges
 
Vpn d’acces avec cisco asa 5500 et client
Vpn d’acces avec cisco asa 5500 et clientVpn d’acces avec cisco asa 5500 et client
Vpn d’acces avec cisco asa 5500 et client
 
Cisco switch setup with cppm v1.2
Cisco switch setup with cppm v1.2Cisco switch setup with cppm v1.2
Cisco switch setup with cppm v1.2
 
Radius Protocol
Radius ProtocolRadius Protocol
Radius Protocol
 
Alphorm.com support de la formation-ccnp route examen 300-101-ss
Alphorm.com support de la formation-ccnp route examen 300-101-ssAlphorm.com support de la formation-ccnp route examen 300-101-ss
Alphorm.com support de la formation-ccnp route examen 300-101-ss
 
Alphorm.com Support de la Formation Cisco CCNP SWITCH (examen 300-115)
Alphorm.com Support de la Formation Cisco CCNP SWITCH (examen 300-115)Alphorm.com Support de la Formation Cisco CCNP SWITCH (examen 300-115)
Alphorm.com Support de la Formation Cisco CCNP SWITCH (examen 300-115)
 
Holistic view of 802.1x integration & optimization
Holistic view of 802.1x integration & optimizationHolistic view of 802.1x integration & optimization
Holistic view of 802.1x integration & optimization
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
 

Similar to 802.1x Authentication Standard

802 11 3
802 11 3802 11 3
802 11 3
rphelps
 

Similar to 802.1x Authentication Standard (20)

Configuring Wired 802.1x Authentication on Windows Server 2012.pdf
Configuring Wired 802.1x Authentication on Windows Server 2012.pdfConfiguring Wired 802.1x Authentication on Windows Server 2012.pdf
Configuring Wired 802.1x Authentication on Windows Server 2012.pdf
 
IRJET- Analysis on the Open Security Issues in 802.1x EAP Security Standa...
IRJET-  	  Analysis on the Open Security Issues in 802.1x EAP Security Standa...IRJET-  	  Analysis on the Open Security Issues in 802.1x EAP Security Standa...
IRJET- Analysis on the Open Security Issues in 802.1x EAP Security Standa...
 
Sw8021x
Sw8021xSw8021x
Sw8021x
 
Network Access COntrol asdfcxzqwe asd asdd .ppt
Network Access COntrol asdfcxzqwe asd asdd .pptNetwork Access COntrol asdfcxzqwe asd asdd .ppt
Network Access COntrol asdfcxzqwe asd asdd .ppt
 
802 11 3
802 11 3802 11 3
802 11 3
 
WLAN and IP security
WLAN and IP securityWLAN and IP security
WLAN and IP security
 
MS NAP - Security Day
MS NAP - Security DayMS NAP - Security Day
MS NAP - Security Day
 
Wireless lan security(10.8)
Wireless lan security(10.8)Wireless lan security(10.8)
Wireless lan security(10.8)
 
EAP-TLS (extended version)
EAP-TLS (extended version)EAP-TLS (extended version)
EAP-TLS (extended version)
 
PIW ISE best practices
PIW ISE best practicesPIW ISE best practices
PIW ISE best practices
 
Ont mod 6
Ont mod 6Ont mod 6
Ont mod 6
 
Keys to Enterprise WLAN Reliability
Keys to Enterprise WLAN ReliabilityKeys to Enterprise WLAN Reliability
Keys to Enterprise WLAN Reliability
 
Enterprise Wireless LAN Reliability
Enterprise Wireless LAN ReliabilityEnterprise Wireless LAN Reliability
Enterprise Wireless LAN Reliability
 
Firewalls
FirewallsFirewalls
Firewalls
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
Network access protection ppt
Network access protection pptNetwork access protection ppt
Network access protection ppt
 
Attacking and Securing WPA Enterprise Networks
Attacking and Securing WPA Enterprise NetworksAttacking and Securing WPA Enterprise Networks
Attacking and Securing WPA Enterprise Networks
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

802.1x Authentication Standard

  • 2. Terms:  Supplicant - The User or Client to be authenticated  Radius Server – The Server doing the authentication  Authenticator – The device between the Supplicant & the Radius Server  EAPOL – (Extensible Authentication Protocol Over LANs)
  • 3. How it Works:  The Authenticator sends an EAP request packet to the Supplicant.  The Supplicant sends an EAP packet to the Authenticator.  The Authenticator sends a packet to the Radius Server.  The Radius Server challenges the Authenticator with a token or password.
  • 4. How it Works: continued…  The Authenticator changes it from the IP to EAPOL.  The Supplicant responds to the challenge and passes it to the Authentication Server.  If there’s a successful challenge, then the Authentication Server responds with a success message allowing access to the LAN.
  • 6. Key Aspects:  Supplicant = End station software  Authenticator = Wired switch or SSID  AuthenticationServer = Ensures certificate or passwords are correct
  • 7. Benefits:  IEEE Standard 98% of all switches support 802.1x  Good authentication  ‘Pre-connect’ enforcement of access policies
  • 8. Drawbacks:  Incompatibilities with certain switches  Some security issues  Tough to deploy  Does not have a ‘post-connect’