802.1x (Port Based Network Access Control)

802.1x-EAP-RADIUS-Messaging

IEEE 802.1x Authentication

For security, users needs to be authenticated in a network. For user authentication, there are various authentication methods. One of them is 802.1x Authentication. What is 802.1x?  In this lesson, we will focus on IEEE 802.1x Protocol and learn the details of this authentication process. You can also check Cisco 802.1x Authentication Configuration Example.

 

Let’s firstly start with the question, What is 802.1x? IEEE  802.1x is a LAN Security Mechanism that provides Port Based Access Control in the network devices. With 802.1x mechanism, devices needs to be authenticated before accessing the network. Here we will focus on the details of Port Based Network Access Control.

 


You can also check Dynamic ARP Inspection , Switch Port Security and DHCP Snooping Mechanisms. 


 

802.1x Roles

After learning what is 802.1x, now, it is time to learn the devices used with IEEE 802.1x Protocol. In IEEE 802.1x Authentication mechanism, there are three different devices which has different roles. So, what are these roles? These three different 802.1x devices and their roles are explained below:

  • Supplicant
  • Authenticator
  • Authentication Server

 

Supplicant : The end point device or software that nees to be authenticated before network access. Windows, Linux, MacOS can be examples of supplicants.  Here, supplicant communicates with the authenticator and sends credentials for this authentication. This is done over EAPoL.

 

Authenticator : Authenticator is the central point which acts according to user credentials information. It is unaware of EAP Authentication process. Authenticator takes EAP packets from supplicant and encapsulates them into RADIUS packets. Then, sends them to the Authentication server.  At the end of the process, Authentication server. informs Authenticator to open the lport or not. It can be a switch, a router, an access point, a WLC or any other network device.

 

Authentication Server : The device that checks the supplicant’s credentials and provides authentication or not.Authentication server sends its results to the Authenticator.

 


802.1x Authentication Example

Here, let’s go through an example. Think about that you are a new employee in a company and you have just get your laptop. You would like to connect the company’s network. Here, the client device that your company has given to you, is the Supplicant.

 

802.1x-Components

 

If your company is using 802.1x Authentication, it has two main configurations in the company network for network users. These configurations are done by the company IT staff to secure company network. These configurations are:

  • Switch’s 802.1x Configuration (Authenticator)
  • AAA Server Configuration (Authentication Server)

 

The company switch port that you are connected to, must be configured with 802.1x Authentication. Beside, usernames and passwords of the clients (Supplicant), must be defined in the AAA Server.

 

So, when you try to connect the company’s network, you need to be authenticated. This authentication is done by company’s Authentication Server through the switch (Authenticator) that you are connected to.

 

Here the process works like below:

  1. Network Connection Request to Authenticator (Switch)
  2. Identity Request to Supplicant (Host)
  3. User & Password are Sent to Authenticator (Switch)
  4. Authentication Check Request to Authentication Server (AAA Server)
  5. Authentication Server will confirm the authentication and it is sent to the Authenticator (Switch)

 


EAP (Extensible Authentication Protocol)

There is alsa an Authentication Protocol used between Supplicant (Host) and Authentication Server (AAA Server). The name of this protocol is EAP (Extensible Authentication Protocol) . With EAP, Supplicant and Authenticator determines the Authentication method.

 

Here, there are different other protocols and encapsulation technologies are used between Supplicant, Authenticator and Authentication Server.

 

The technology between Supplicant and Authenticator, is Ethernet, a Layer 2 technology. Here, the EAP packets are transfered in ethernet frame with EAP over LAN (EAPol) encapsulation.

 

The protocols used between Authenticator and Authentication Server are RADIUS or Diameter Protocols. This parts works on Layer 3.

 


EAP and RADIUS Messages

Now, let’s think about a 802.1x process with RADIUS and check both EAP and RADIUS messages between the three components of IEEE 802.1x Protocol.

802.1x-EAP-RADIUS-Messaging

An IEEE 802.1x Authentication process can start in two ways. The first one is periodic EAP Identity requests of the Authenticator. When a new port become online, authenticator detects it and starts authentication process.  The other way can be done by Client (Supplicant). Client can send EAPOL Start Message to start this authentication process.  Let’s see these steps.

 

1) The first step of IEEE 802.1x Authenticaiton is EAPoL Start Message sent by the host to the Authenticator (Switch). It means, “I would like to enter the network”.

 

2) The switch (Authenticator),  response with an EAP Identity Request (User & Password) to this message. It means, “Who are you?”.

 

3) At that time, Authentication starts. User sends its user & password information to the switch. This means, “I am A and my password is xyz”.

 

4) Switch sends this user & password information to Authentication Server to check that it is a valid user and password. This RADIUS message means, “Could you check these user credentials?

 

5) When Authentication Server gets this message, it compares user information with its own database to obtain the corresponding password information. To do this, it encrypts this password with a randomly generated challenge info and sends this to the switch.

 

6) Switch sends this information to the Supplicant (Host).

 

7) After that, host creates a password with the sent challenge (randomly generated password sent by Authentication Server).

 

8) Again, Authenticator (Switch) sends the packet to the Authentication Server.

 

9) When Authentication Server gets the packet, it compares the created password by its created password with this credential. If it is same, it determines that, user is valid.

 

10) Then, it sends Radius Access Accept Message. This message shows that the user is valid and the authorization details, what can this user do in this network?

 

11) After successfull Authentication and Authorization, Accounting process is done. This records that, what did this user do in this network.

 

In summary, for 802.1x Authentication, there are three requirements. These requirements are:

  • Authentication Server must have User Credentials (Username&Password)
  • Authenticator (Switch) needs to be configured for 802.1x Authentication.
  • User (Supplicant) must be avare of its credentials.

 


Frequently Asked Questions

What is Port-Based Network Access Control?

Port-Based Network Access Control (PNAC) means that a switch or access point controls access to the network port until the device successfully authenticates. Here, if authentication fails, the device cannot access the network.


What are the main components of 802.1X?

There are three key components in an 802.1X authentication process. These are

  1. Supplicant – The client device requesting access (PC, phone etc.)

  2. Authenticator – The network device controlling access (usually a switch or Access Point)

  3. Authentication Server – Usually a RADIUS server


What protocol does 802.1X use for authentication?

802.1X uses EAP (Extensible Authentication Protocol) to carry authentication information. There are some EAP methods which define how authentication credentials are exchanged. These EAP methods are:

  • EAP-TLS

  • PEAP

  • EAP-FAST

 


What is EAPOL?

EAPOL is the abbreviation of Extensible Authentication Protocol over LAN. It is a layer 2 protocol used to carry EAP messages between the supplicant and the authenticator.


How does the 802.1X authentication process work?

We can explain 802.1XAuthentication process briefly like below:

  1. Client connects to a switch port

  2. Switch blocks normal traffic

  3. Client sends EAPOL Start

  4. Switch forwards authentication request to the RADIUS server

  5. RADIUS validates credentials

  6. Access is granted or denied

 


Where is 802.1X commonly used?

802.1X is generally used in Enterprise campus networks, Wi-Fi networks, Zero Trust architectures, Network Access Control (NAC) solutions etc.


What happens if 802.1X authentication fails?

If 802.1x authentication fails, the traffic is blocked, the port remains unauthorized and the device may be placed in a restricted VLAN or guest network.


What are the benefits of 802.1X?

Ussing 802.1x Authentication has some key advantages. These are:

  • Strong network security,

  • Prevents unauthorized devices,

  • Enables identity-based access control,

  • Integrates with RADIUS and NAC systems.

 


What is the difference between 802.1X and MAC Authentication Bypass (MAB)?

802.1X uses user/device authentication while MAB uses MAC address authentication. 802.1X provides stronger security while MAB provides weaker security. 802.1X requires a supplicant while MAB is used for devices without supplicants (printers, IP phones).

Lesson tags: 802.1X authentication, 802.1X
Back to: CCNA 200-301 v1.1 > Security Fundamentals

Leave a Reply

Your email address will not be published. Required fields are marked *

CCNA 200-301 v1.1

Collapse
Expand