Quick Reference Guide

928 PowerConnect B-Series TI24X Configuration Guide
53-1002269-02
How 802.1X port security works
28
Controlled and uncontrolled ports
A physical port on the device used with 802.1X port security has two virtual access points a
controlled port and an uncontrolled port. The controlled port provides full access to the network.
The uncontrolled port provides access only for EAPOL traffic between the Client and the
Authentication Server. When a Client is successfully authenticated, the controlled port is opened to
the Client. Figure 119 illustrates this concept.
FIGURE 119 Controlled and uncontrolled ports before and after client authentication
Before a Client is authenticated, only the uncontrolled port on the Authenticator is open. The
uncontrolled port allows only EAPOL frames to be exchanged between the Client and the
Authentication Server. The controlled port is in the unauthorized state and allows no traffic to pass
through.
During authentication, EAPOL messages are exchanged between the Supplicant PAE and the
Authenticator PAE, and RADIUS messages are exchanged between the Authenticator PAE and the
Authentication Server.Refer to “Message exchange during authentication” on page 929 for an
example of this process. If the Client is successfully authenticated, the controlled port becomes
authorized, and traffic from the Client can flow through the port normally.
By default, all controlled ports on the device are placed in the authorized state, allowing all traffic.
When authentication is activated on an 802.1X-enabled interface, the interface controlled port is
placed initially in the unauthorized state. When a Client connected to the port is successfully
authenticated, the controlled port is then placed in the authorized state until the Client logs
off.Refer to “Enabling 802.1X port security” on page 945 for more information.
Authentication
Server
Authentication
Server
802.1X-Enabled
Supplicant
802.1X-Enabled
Supplicant
PAE
PAE
PAE
PAE
Services
Services
Uncontrolled Port
Physical Port
Controlled Port
(Unauthorized)
Uncontrolled Port
Controlled Port
(Authorized)
Physical Port
Before Authentication
After Authentication
Switch
(Authenticator)
Switch
(Authenticator)