Thinking Outside the Box: Extending 802.1x Authentication to Remote "Splitter" Ports by Combining Physical and Data Link Layer Techniques
نویسندگان
چکیده
We present a novel switched full-duplex LAN architecture which can greatly simplify the cabling requirements in areas that must support high port densities and/or are subject to frequent changes. Instead of providing a separate cable to connect each host to a dedicated port on a monolithic switch behind the wall, we emulate the shared bus topology from the early days of Ethernet by daisy-chaining a series of small network-powered “slave” bridge modules called Ethernet Splitters from a single port on the “master” switch. Our partitioned switch architecture enforces network privacy throughout the entire splitter chain, so no host can view any traffic belonging to another host. The splitters also authenticate the point of origin for every frame, independent of the value contained in its source address field thus providing the same level of security as a monolithic switch under the 802.1x Port Based Access Control protocol. 1 Why Switched LANs? In recent years, Ethernet-based Local Area Networks have been transformed. The old shared half-duplex network paradigm — in which multiple hosts must take turns transmitting frames over a common medium known as a “collision domain”, according to the well-known CSMA/CD medium access control protocol — has been replaced by a new full-duplex switched network paradigm — in which each host is connected to a separate port on an IEEE 802.1d Transparent Bridge (commonly referred to as a LAN “switch”) via a dedicated, collision free, full-duplex link segment (see Fig 1). Switching was originally conceived as a means for substantially increasing the overall capacity of a network, using filtering to avoid transmitting frames to those network segments known not to contain the destination address. We will not consider this performance advantage any further in this paper. Instead, we will focus our attention on privacy and authentications issues, and how this migration to full-duplex switched networks has enabled dramatic improvements in these areas compared to earlier half-duplex shared Ethernet systems. Switch
منابع مشابه
Comparative Analysis of IEEE 802.1x Authentication Methods
The IEEE Standard 802.11 is one of the most widely adopted mechanisms for WLANs, it provides comprehensive guidelines for their operational smoothness. 802.11 suffered from limited data confidentiality and cumbersome procedure for exchange of security parameters. In response to the security limitations in 802.11, IEEE introduced 802.1x for authentication and key management. The 802.1x is a port...
متن کاملIEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines
This document provides suggestions on Remote Authentication Dial In User Service (RADIUS) usage by IEEE 802.1X Authenticators. The material in this document is also included within a non-normative Appendix within the IEEE 802.1X specification, and is being presented as an IETF RFC for informational purposes. Congdon, et al. Informational [Page 1] RFC 3580 IEEE 802.1X RADIUS September 2003 Table of
متن کاملAuthorization and Charging in Public WLANs Using FreeBSD and 802.1x
The IEEE 802.1x standard defines a link-layer level authentication protocol for local area networks. While originally designed to authenticate users in a switched Ethernet environment, it looks like the most important need for 802.1x lies in wireless networks, especially IEEE 802.11b based Wireless LANs. Furthermore, due to the flexibility of the Extensible Authentication Protocol (EAP), the he...
متن کاملDebunking the Myths About Optical LAN
Fact: Tellabs Optical LAN provides Access Control Lists (ACLs), Broadcast Datagram Rate Limiting at each user device and strong authentication. Authentication based on 802.1x allows multiple devices per user port along with advanced intrusion detection — effectively locking down the physical port upon detection of an untrusted device. ACLs provide flexibility to statically and/or dynamically pe...
متن کاملEnabling Trusted Distributed Control with Remote Attestation
In a networked environment where computers are required to collectively work together, it is frequently the case that a single compromised machine can compromise the functionality of the entire system. In such an environment, standard protocols such as password authentication may not provide the security level we desire in that a computer attempting to gain access to the network cannot prove th...
متن کامل