SlideShare a Scribd company logo
Page  1
Introdutction – 802.1x Port-Based Authentication
Supplicant: IEEE 802.1X Client
· Microsoft Native and Cisco Secure Service
Clients (SSC)
- Windows 2000 and later support 802.1x
Authenticator: Access Device
· Cisco Catalyst Switches and Access
Points
- Cisco 2960 (IOS version 12.2(52)SE )
Back-End Database
· AD, LDAP
 To prevent unauthorized devices from accessing the network
Page  2
Introduction – Authentication Process
Page  3
Introduction – IEEE 802.1X Protocols
 Extensible Authentication Protocol (EAP)
 A flexible transport protocol used to encapsulate and carry
authentication information
Page  4
Introduction – Deault Security with 802.1x
Unknown User
DHCP
TFTP
KRB5
HTTP
 No Authentication Required
 No access control
 Hard to identify users
?
Page  5
Introduction – Deault Security with 802.1x
Unknown User
DHCP
TFTP
KRB5
HTTP
 Before Authentication
 Strictly access control
 Still hard to identify users
 Only EAPOL,CDP,and STP traffic pass before authentication
?
EAPOL
Page  6
Introduction – Deault Security with 802.1x
ID: yichun
Pwd:yichun
DHCP
TFTP
KRB5
HTTP
 After Authentication
 User or device is known
 Identity-based access control
 Single MAC per port (except for IP phone and VMware)
Page  7
Introduction – Deault Security with 802.1x
Unknown User
DHCP
TFTP
EAPOL
 Clients without supporting 802.1x cannot send EAPOL
 Only windows 2000 and later support 802.1x
 No access without EAPOL
? No response
Page  8
Introduction – IEEE 802.1X Decision-making
Start
Is the client IEEE 802.1x capable?
Start IEEE 802.1x port-based
authentication
Assign the port to a
restricted VLAN
Assign the port to a
VLAN
Done Done
IEEE 802.1x authentication
process times out.
Is MAC authentication bypass
enable? 1
Use MAC authentication bypass
Assign the port to a
restricted VLAN
Assign the port to a
VLAN
Done Done
Use inaccessible
authentication bypass
(critical authentication)
to assign the critical
port to a VLAN
Done
No
Y es
Client
identity
is invalid
Client
identity
is valid
All authentication
servers are down
Y es
All authentication
servers are down
The switch gets an EAPOL
message, and the EAPOL
message exchange begins.
Client MAC
address
identity is
valid
Client MAC
address
identity is
invalid
1 = This occurs if the switch does not detect EAPOL packets from the client.
Page  9
Introduction – MAC Authentication Bypass (MAB)
 Devices with known MAC are granted to access to the internet
 Clients change nothing while implementing authentication
Page  10
Trunk
Trunk Trunk
廠區 - Core Switch
Cisco Catalyst
6509 switch
機房
Cisco Catalyst
3560 switch
End-user 端
Cisco Catalyst
2960 switch
End-user
PC/NB
Radius server &
Active Directory
10.36.3.200
10.36.3.201
Unknown users Valid users
VLAN 362
10.36.232.16~
10.36.235.254
MAC
Authentication starts!
Authentication FAIL!
- Invalid MAC
Invalid MAC is
assigned to
VLAN 362
10.36.232.16
MAC
Authentication success!
User-specific VLANThis user is
assigned to
VLAN 390
10.39.X.X
X
X
Deny accessing
Deny accessing
Page  11
System Environment
 Environment and Equipment
– Microsoft Windows Server 2003 R2
– Cisco Catelyst 2960 series
• IOS Version: 12.2 (52) SE
*12.2(40) and later support MAC-Auth-Bypass
 Software
– Internet Authentication Service (IAS)
– Active Directory
– DNS Server

More Related Content

PPTX
IEEE 802.1 x
PPTX
IEEE 802.1 x
PDF
Configuring Wired 802.1x Authentication on Windows Server 2012.pdf
PDF
Configuring Wired 802.1x Authentication on Windows Server 2012.pdf
PDF
PDF
PPT
Implementing 802.1x Authentication
PPT
Implementing 802.1x Authentication
IEEE 802.1 x
IEEE 802.1 x
Configuring Wired 802.1x Authentication on Windows Server 2012.pdf
Configuring Wired 802.1x Authentication on Windows Server 2012.pdf
Implementing 802.1x Authentication
Implementing 802.1x Authentication

Similar to Introdutction – 802.1x Port-Based Authentication (20)

PDF
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
PDF
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
PDF
IEEE 802.1X and Axis’ Implementation
PDF
IEEE 802.1X and Axis’ Implementation
PPT
Cisco Security Training on ASA and FMC.ppt.ppt
PPT
Cisco Security Training on ASA and FMC.ppt.ppt
PDF
At8000 s configurando_8021x
PDF
At8000 s configurando_8021x
PPSX
SwitchSecurity SwitchSecurity SwitchSecurity SwitchSecurity
PPSX
SwitchSecurity SwitchSecurity SwitchSecurity SwitchSecurity
DOCX
Configuring dynamic switchport security
DOCX
Configuring dynamic switchport security
PPT
802.1x
PPT
802.1x
PDF
Basic Network Security_Primer
PDF
Basic Network Security_Primer
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 2
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 2
PDF
8021x feature config_guide
PDF
8021x feature config_guide
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
IEEE 802.1X and Axis’ Implementation
IEEE 802.1X and Axis’ Implementation
Cisco Security Training on ASA and FMC.ppt.ppt
Cisco Security Training on ASA and FMC.ppt.ppt
At8000 s configurando_8021x
At8000 s configurando_8021x
SwitchSecurity SwitchSecurity SwitchSecurity SwitchSecurity
SwitchSecurity SwitchSecurity SwitchSecurity SwitchSecurity
Configuring dynamic switchport security
Configuring dynamic switchport security
802.1x
802.1x
Basic Network Security_Primer
Basic Network Security_Primer
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2
8021x feature config_guide
8021x feature config_guide
Ad

Recently uploaded (20)

PDF
Classroom Observation Tools for Teachers
PPTX
master seminar digital applications in india
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
RMMM.pdf make it easy to upload and study
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Presentation on HIE in infants and its manifestations
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Computing-Curriculum for Schools in Ghana
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Pharma ospi slides which help in ospi learning
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Classroom Observation Tools for Teachers
master seminar digital applications in india
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
RMMM.pdf make it easy to upload and study
STATICS OF THE RIGID BODIES Hibbelers.pdf
O7-L3 Supply Chain Operations - ICLT Program
Microbial disease of the cardiovascular and lymphatic systems
Complications of Minimal Access Surgery at WLH
Presentation on HIE in infants and its manifestations
102 student loan defaulters named and shamed – Is someone you know on the list?
Computing-Curriculum for Schools in Ghana
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Final Presentation General Medicine 03-08-2024.pptx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Pharma ospi slides which help in ospi learning
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Ad

Introdutction – 802.1x Port-Based Authentication

  • 1. Page  1 Introdutction – 802.1x Port-Based Authentication Supplicant: IEEE 802.1X Client · Microsoft Native and Cisco Secure Service Clients (SSC) - Windows 2000 and later support 802.1x Authenticator: Access Device · Cisco Catalyst Switches and Access Points - Cisco 2960 (IOS version 12.2(52)SE ) Back-End Database · AD, LDAP  To prevent unauthorized devices from accessing the network
  • 2. Page  2 Introduction – Authentication Process
  • 3. Page  3 Introduction – IEEE 802.1X Protocols  Extensible Authentication Protocol (EAP)  A flexible transport protocol used to encapsulate and carry authentication information
  • 4. Page  4 Introduction – Deault Security with 802.1x Unknown User DHCP TFTP KRB5 HTTP  No Authentication Required  No access control  Hard to identify users ?
  • 5. Page  5 Introduction – Deault Security with 802.1x Unknown User DHCP TFTP KRB5 HTTP  Before Authentication  Strictly access control  Still hard to identify users  Only EAPOL,CDP,and STP traffic pass before authentication ? EAPOL
  • 6. Page  6 Introduction – Deault Security with 802.1x ID: yichun Pwd:yichun DHCP TFTP KRB5 HTTP  After Authentication  User or device is known  Identity-based access control  Single MAC per port (except for IP phone and VMware)
  • 7. Page  7 Introduction – Deault Security with 802.1x Unknown User DHCP TFTP EAPOL  Clients without supporting 802.1x cannot send EAPOL  Only windows 2000 and later support 802.1x  No access without EAPOL ? No response
  • 8. Page  8 Introduction – IEEE 802.1X Decision-making Start Is the client IEEE 802.1x capable? Start IEEE 802.1x port-based authentication Assign the port to a restricted VLAN Assign the port to a VLAN Done Done IEEE 802.1x authentication process times out. Is MAC authentication bypass enable? 1 Use MAC authentication bypass Assign the port to a restricted VLAN Assign the port to a VLAN Done Done Use inaccessible authentication bypass (critical authentication) to assign the critical port to a VLAN Done No Y es Client identity is invalid Client identity is valid All authentication servers are down Y es All authentication servers are down The switch gets an EAPOL message, and the EAPOL message exchange begins. Client MAC address identity is valid Client MAC address identity is invalid 1 = This occurs if the switch does not detect EAPOL packets from the client.
  • 9. Page  9 Introduction – MAC Authentication Bypass (MAB)  Devices with known MAC are granted to access to the internet  Clients change nothing while implementing authentication
  • 10. Page  10 Trunk Trunk Trunk 廠區 - Core Switch Cisco Catalyst 6509 switch 機房 Cisco Catalyst 3560 switch End-user 端 Cisco Catalyst 2960 switch End-user PC/NB Radius server & Active Directory 10.36.3.200 10.36.3.201 Unknown users Valid users VLAN 362 10.36.232.16~ 10.36.235.254 MAC Authentication starts! Authentication FAIL! - Invalid MAC Invalid MAC is assigned to VLAN 362 10.36.232.16 MAC Authentication success! User-specific VLANThis user is assigned to VLAN 390 10.39.X.X X X Deny accessing Deny accessing
  • 11. Page  11 System Environment  Environment and Equipment – Microsoft Windows Server 2003 R2 – Cisco Catelyst 2960 series • IOS Version: 12.2 (52) SE *12.2(40) and later support MAC-Auth-Bypass  Software – Internet Authentication Service (IAS) – Active Directory – DNS Server

Editor's Notes

  • #1: IAS Server - 10.36.3.200 - 10.36.3.201 - 10.62.1.200