Enterasys Networks 9034385 Plumbing Product User Manual


 
Survey the Network
4-6 Design Planning
Similarto802.1X,webbasedauthenticationrequirestheinputofcredentialsandisnormallyused
onusercentricendsystems thathaveaconceptofanassociateduser,suchasaPC.Therefore,this
authenticationmethodisinappropriateformachinecentricdevicessuchasprintersandIP
cameras.
Notethatweb
basedauthenticationisauserinitiatedauthenticationmethodwheretheusermust
manuallybeginthenetworkloginprocessbyopeningawebbrowserandenteringcredentials.
Thisuserinitiatedmethodpreventsseamlessnetworkconnectivitybecausetheendusermust
initiatethereauthenticationafterassessmentiscomplete.
SinceEnterasysNAConlyacts
asapassthroughtoanupstreamRADIUSServer,itismandatory
thatafullauthenticationdeploymentisconfiguredonthenetworkifwebbasedauthentica tionis
used.
MACAuthentication
MACauthenticationauthenticatesthesourceMACaddressofanendsystemandgrantsthe
appropriatelevelofaccessbyvalidatingtheMAC
addressontheRADIUSauthenticationserver.
Thisauthenticationmethodonlyrequiresthattheendsystemgenerateapacket;itrequiresno
specialsoftwareontheendsystem.
Unlike802.1Xandwebbasedauthentication,MACauthenticationcanbeusedtoauthenticate
machinecentricendsystemsthathavenoconceptofanassociated
user,suchasaprinterorIP
camera.
Withthisauthenticationmethod,EnterasysNACcanactasapassthroughtoanupstream
RADIUSServerorcanlocallyauthorizeMACauthenticationattempts.Therefore,ifafull
authenticationdeploymenthasnotbeenconfiguredonthenetwork,MACauthenticationshould
beused.
End-System Capabilities
Whenauthenticationisconfiguredonthenetwork,itisimportanttoconsiderendsystem
capabilitiesandtheirabilitytointeractwiththeauthentication process.Machinecentricend
systemsthatdonotpossessan802.1Xsupplicant,suchasIPcamerasandprinters,mayonlybe
capableofMACauthenticatingtothenetwork.
SomehumancentricendsystemssuchasPCs,
maybecapableof802.1XandwebbasedauthenticationwhileotherPCsnotinstalledwithan
802.1Xsupplicant,areonlycapableofwebbasedauthentication.Ifendsystemsareimplementing
802.1Xandwebbasedauthentication,EnterasysNACshould leveragetheseauthentication
methods
forendsystemdetection.Forendsystemsnotimplementing802.1Xorwebbased
authentication,MACbasedauthenticationcanbeenabledontheseswitchports.
Support of Multiple Authentication Methods
Inordertosupportanenterprisenetworkconsistingofadiverseenvironmentofmachinecentric
andhumancentricdevices,itisimportantthattheintelligentedgeofthenetworksupportsthe
concurrentenablingofmultipleauthenticationmethods,allatthesametimeonthesameswitch
port.Someintelligentswitchesmay
notsupporttheenablingofmultipleauthenticationmethods
concurrentlyonasingleport.Forexample,MACand802.1Xauthenticationmaybeconcurrently
enabledonaporttoaccountforthefactthatatrusteduser,guestuser,orIPphonemayconnectto
thisport.Theabilitytosupportmultiple
authenticationmethodsconcurrentlyonaportiseven
moreimportantforenvironmentswheremobilityofdevicesaroundthenetworkisessentialfor
ensuringbusinesscontinuity.
Support for Multiple End-System Connection
Itisimportanttoknow whethermultipleendsystemconnectionissupportedbytheintelligent
edgeofthenetwork.Iftheintelligentedgedevicesonlysupporttheauthenticationofoneend