IEEE 802.1X is a standard that enables or denies par­tic­i­pants in networks. The method is supported by all common operating systems.

What is 802.1X?

Simply put, IEEE 802.1X is a standard that checks the various par­tic­i­pants in a LAN or WLAN network and then either grants or denies them access. IEEE 802.1X is a stand­alone standard that operates at the link layer, the second layer of the OSI model. Its main task is to identify unau­tho­rized users even before they access an IEEE 802 network, pro­tect­ing the en­vi­ron­ment from unwanted access. The method gives unknown par­tic­i­pants access to the network after a thorough check.

IEEE 802.1X was in­tro­duced by the Institute of Elec­tri­cal and Elec­tron­i­cal Engineers (IEEE) in 2001 and was orig­i­nal­ly intended only for LAN networks. Now the standard is also used for WLAN en­vi­ron­ments. Au­then­ti­ca­tion and au­tho­riza­tion are performed at the physical port of the network. Various protocols are used for this purpose. The IEEE 802.1X standard is sometimes referred to as “IEEE Standard for Local and Met­ro­pol­i­tan Area Networks - Port-Based Network Access Control” (PNAC). In addition to pure access control, IEEE 802.1X can be used to allocate band­widths and regulate network use.

Note

The Institute of Elec­tri­cal and Elec­tron­i­cal Engineers has defined other net­work­ing standards to enable our everyday digital com­mu­ni­ca­tions. Read about them in the Digital Guide:

What’s IEEE 802.1X being used for?

The IEEE 802.1X au­then­ti­ca­tion process contains three actors: a sup­pli­cant, an au­then­ti­ca­tor or ne­go­tia­tor, and an au­then­ti­ca­tion server (AS).

Sup­pli­cant

The re­questers can be any device that must first be au­then­ti­cat­ed according to the network rules and IEEE 802.1X. These can be computers, printers, scanners or other devices.

Au­then­ti­ca­tor

The au­then­ti­ca­tor performs the actual ver­i­fi­ca­tion and decides whether the sup­pli­cant is granted access to the network or not. It checks the applicant’s cre­den­tials in the IEEE 802.1X procedure. If they are in order, access is granted. If they don’t comply with the network rules, access is denied. The au­then­ti­ca­tor is a WLAN access point, a router, or an IEEE 802.1X-capable switch.

Au­then­ti­ca­tion Server

The au­then­ti­ca­tion server is a WLAN access point, a RADIUS server, or an LDAP gateway. It’s installed in a protected network and provides the au­then­ti­ca­tor with an au­then­ti­ca­tion service. It matches the applicant’s cre­den­tials with stored and pre­vi­ous­ly defined au­tho­riza­tions.

How does IEEE 802.1X work?

To get a better idea of the basic operation of IEEE 802.1X, let’s compare the procedure to ordinary access control. For example, assume a guest wants to get into a party. He hands his in­vi­ta­tion to the bouncer who then scans the card, receives con­fir­ma­tion that the guest has been invited, and grants him access to the premises. If, on the other hand, the card is faulty or not present, the guest is denied entry.

In IEEE 802.1X, the sup­pli­cant is the guest, which forwards its cre­den­tials to the au­then­ti­ca­tor via the Ex­ten­si­ble Au­then­ti­ca­tion Protocol (EAP). The au­then­ti­ca­tor sends the cre­den­tials to the au­then­ti­ca­tion server, which compares them with the pre­vi­ous­ly defined au­tho­riza­tions. The cre­den­tials can be stored in a simple text file or avin database. The server checks the cre­den­tials and returns the result to the au­then­ti­ca­tor. If the data is correct, the au­then­ti­ca­tor enables access to the network, grants the sup­pli­cant admission and may allocate bandwidth for network use. If the cre­den­tials are incorrect, the sup­pli­cant is rejected.

What are the ad­van­tages of IEEE 802.1X?

The use of IEEE 802.1X offers numerous ad­van­tages. The main advantage is that the method is a standard which means it’s widely used. IEEE 802.1X is supported by all common operating systems. It’s easy to implement and provides good pro­tec­tion against unwanted access. IEEE 802.1X is also very versatile. The standard doesn’t just work for LAN networks, but also in com­bi­na­tion with WLAN and VLAN. In­di­vid­ual login re­quire­ments can be defined for each sup­pli­cant. There are other functions such as ad­min­is­tra­tion options or the provision and al­lo­ca­tion of usage bandwidth as well.

MAC address as an al­ter­na­tive to IEEE 802.1X

While IEEE 802.1X is supported by almost all operating systems like Windows, macOS and Linux as well as many network types, some devices don’t use the standard, such as certain printers or webcams, for example. In that case, the switch uses the MAC address of the host for au­then­ti­ca­tion and creates a username and password from it. However, this method is very vul­ner­a­ble compared to IEEE 802.1X and can be misused for unau­tho­rized access.

Go to Main Menu