Supported Platforms
Related Documentation
- EX Series
- Understanding Authentication on EX Series Switches
- Understanding 802.1X and VoIP on EX Series Switches
- Understanding 802.1X and LLDP and LLDP-MED on EX Series Switches
- Understanding 802.1X and RADIUS Accounting on EX Series Switches
- Understanding Guest VLANs for 802.1X on EX Series Switches
- Understanding 802.1X and VSAs on EX Series Switches
- Understanding Server Fail Fallback and Authentication on EX Series Switches
802.1X for EX Series Switches Overview
IEEE 802.1X provides network edge security, protecting Ethernet LANs from unauthorized user access.
How 802.1X Authentication Works
802.1X authentication works by using an Authenticator Port Access Entity (the switch) to block all traffic to and from a supplicant (end device) at the port until the supplicant's credentials are presented and matched on the Authentication server (a RADIUS server). When authenticated, the switch stops blocking traffic and opens the port to the supplicant.
The end device is authenticated in either single mode, single-secure mode, or multiple mode:
- single—Authenticates only the first end device. All other end devices that connect later to the port are allowed full access without any further authentication. They effectively “piggyback” on the end devices’ authentication.
- single-secure—Allows only one end device to connect to the port. No other end device is allowed to connect until the first logs out.
- multiple—Allows multiple end devices to connect to the port. Each end device will be authenticated individually.
Network access can be further defined using VLANs and firewall filters, which both act as filters to separate and match groups of end devices to the areas of the LAN they require. For example, you can configure VLANs to handle different categories of authentication failures depending upon:
- Whether or not the end device is 802.1X-enabled.
- Whether or not MAC RADIUS authentication has been configured on the switch interfaces to which the hosts are connected.
- Whether the RADIUS authentication server becomes unavailable or sends a RADIUS access-reject message. See Configuring Server Fail Fallback (CLI Procedure).
802.1X Features Overview
802.1X features on Juniper Networks EX Series Ethernet Switches are:
- Guest VLAN—Provides limited access to a LAN, typically just to the Internet, for nonresponsive end devices that are not 802.1X-enabled when MAC RADIUS authentication has not been configured on the switch interfaces to which the hosts are connected . Also, a guest VLAN can be used to provide limited access to a LAN for guest users. Typically, the guest VLAN provides access just to the Internet and to other guests’ end devices.
- Server-reject VLAN—Provides limited access to a LAN, typically just to the Internet, for responsive end devices that are 802.1X-enabled but that have sent the wrong credentials.
- Server-fail VLAN—Provides limited access to a LAN, typically just to the Internet, for 802.1X end devices during a RADIUS server timeout.
- Dynamic VLAN—Enables an end device, after authentication, to be a member of a VLAN dynamically.
- Private VLAN—Enables configuration of 802.1X authentication on interfaces that are members of private VLANs (PVLANs).
- Dynamic changes to a user session—Allows the switch administrator to terminate an already authenticated session. This feature is based on support of the RADIUS Disconnect Message defined in RFC 3576.
- Support for VoIP—Supports IP telephones. If the
phone is 802.1X-enabled, it is authenticated like any other supplicant.
If the phone is not 802.1X-enabled, but has another 802.1X-compatible
device connected to its data port, that device is authenticated, and
then VoIP traffic can flow to and from the phone (providing that the
interface is configured in single mode and not in single-secure mode).
Note: Configuring a VoIP VLAN on private VLAN (PVLAN) interfaces is not supported.
- RADIUS accounting—Sends accounting information to the RADIUS accounting server. Accounting information is sent to the server whenever a subscriber logs in or logs out and whenever a subscriber activates or deactivates a subscription.
- Vendor Specific Attributes (VSAs)—Supports the Juniper-Switching-Filter attribute on the RADIUS authentication server that can be used further define a supplicant's access during the 802.1X authentication process. Centrally configuring VSAs on the authentication server does away with the need to configure these same attributes in the form of firewall filters on every switch in the LAN to which the supplicant may connect to the LAN. This feature is based on RLI 4583, AAA RADIUS BRAS VSA Support.
Supported Features Related to 802.1X Authentication
802.1X does not replace other security technologies. 802.1X works together with port security features, such as DHCP snooping, dynamic ARP inspection (DAI), and MAC limiting, to guard against spoofing.
Supported features related to authentication include:
- Static MAC bypass—Provides a bypass mechanism to authenticate devices that are not 802.1X-enabled (such as printers). Static MAC bypass connects these devices to 802.1X-enabled ports, bypassing 802.1X authentication.
- MAC RADIUS authentication—Provides a means to enable or disable MAC authentication independently of whether 802.1X authentication is enabled.
![]() | Note: You cannot configure 802.1X authentication on redundant trunk groups (RTGs). |
Related Documentation
- EX Series
- Understanding Authentication on EX Series Switches
- Understanding 802.1X and VoIP on EX Series Switches
- Understanding 802.1X and LLDP and LLDP-MED on EX Series Switches
- Understanding 802.1X and RADIUS Accounting on EX Series Switches
- Understanding Guest VLANs for 802.1X on EX Series Switches
- Understanding 802.1X and VSAs on EX Series Switches
- Understanding Server Fail Fallback and Authentication on EX Series Switches
Published: 2012-12-06
Supported Platforms
Related Documentation
- EX Series
- Understanding Authentication on EX Series Switches
- Understanding 802.1X and VoIP on EX Series Switches
- Understanding 802.1X and LLDP and LLDP-MED on EX Series Switches
- Understanding 802.1X and RADIUS Accounting on EX Series Switches
- Understanding Guest VLANs for 802.1X on EX Series Switches
- Understanding 802.1X and VSAs on EX Series Switches
- Understanding Server Fail Fallback and Authentication on EX Series Switches