132 Dell PowerConnect 55xx Systems User GuideFILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\DellContax\CxU_Switching_NetworkSecurity.fmD E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 1 / 1 2 - F O R P R O O F O N LYDot1x AuthenticationThis section describes Dot1x authentication.It contains the following topics:• Port-Based Authentication Overview• Dot1x Overview• Port-Based Authentication Global• Port-Based Authentication Interface Settings• Monitoring Users• Host Authentication• Port Authentication UsersPort-Based Authentication OverviewPort-based authentication enables authenticating system users on a per-portbasis via an external server. Only authenticated and approved system userscan transmit and receive data. Ports are authenticated via the RADIUS serverusing the Extensible Authentication Protocol (EAP). Port Authenticationincludes:• Authenticators — Specifies the device port that is authenticated beforepermitting system access.• Supplicants — Specifies the host connected to the authenticated port hatis requesting to access the system services.• Authentication Server — Specifies the external server, for example, aRADIUS server, which performs authentication on behalf of theauthenticator, and indicates whether the supplicant is authorized to accesssystem services.Port-based authentication creates two access states:• Controlled Access — Permits communication between the supplicant andthe system, if the supplicant is authorized.• Uncontrolled Access — Permits uncontrolled communication, regardlessof the port authorization state.