Knowledge (XXG)

Supplicant (computer)

Source 📝

243: 54: 144: 98:
authentication to regulate users access to their corresponding network infrastructure. And to enable this, client devices need to meet supplicant definition in order to gain access. In businesses, for example, it is very common that employees will receive their new computer with all the necessary
111:
For a supplicant-capable device to gain access to the secured resources on a network, some preconditions should be observed and a context that will make this feasible. The network to which the supplicant needs to interact with must have a
77:
in a network environment seeking to access network resources secured by the IEEE 802.1X authentication mechanism. But saying "user" or "client" over-generalizes; in reality, the interaction takes place through a
246:
This is a screenshot of the Network Interface Card properties window to enable or disable support for IEEE 802.1x authentication. Many other options can be adjusted as seen fit.
235:(NIC), and from the Authentication tab, "Enable IEEE 802.1X authentication" need to be checked. Similar steps need to be taken on other network devices that provide support for 442: 86:(IP) phone, or similar network device. Each of these must run supplicant software that initiates or reacts to IEEE 802.1X authentication requests for association. 436: 383: 424: 220:
One aspect of reality a user needs to understand and, more likely comply with the network administrator is the use of user name and password, or a
288: 239:
authentication. This is the most important single step a user will need to make in order for one's network device to act as a supplicant.
121: 242: 147:
Here is a list of authenticated users as displayed in Linksys LGS528P Switch. In this case, the LGS528P is acting as the Authenticator
341: 28: 46:
installed on an end-user's computer. The user invokes the supplicant and submits credentials to connect the computer to a secure
133: 94:
Businesses, campuses, governments and all other social entities across-the-board in need of security may resort to the use of
419: 430: 61:
is optional; the supplicant can connect straight to the authenticator itself. In a hub or an unmanaged switch, the
132:
domain controller. The domain controller is particularly needed in Microsoft environments when using Microsoft's
231:, one should make sure to enable one's client to act as a supplicant by going to the Network Properties of the 50:. If the authentication succeeds, the authenticator typically allows the computer to connect to the network. 448: 362: 42:
standard uses the term "supplicant" to refer to either hardware or software. In practice, a supplicant is a
232: 137: 53: 143: 43: 264: 260: 256: 20: 295: 463: 83: 79: 320: 181: 129: 47: 204: 457: 259:; since then, it has been replaced by NPS on all subsequent Windows Server releases ( 117: 35: 163: 58: 65:
port (the port to which the hub is connected) should be set in multi-session mode.
236: 221: 209: 100: 95: 39: 407: 268: 192: 169: 125: 228: 140:(NPS) software to provide RADIUS services from the Authentication Server. 177: 103:
authentication, in particular when connecting wirelessly to the network.
443:
Creating a secure 802.1x wireless infrastructure using Microsoft Windows
267:...). IAS and NPS are not the only RADIUS Servers, some other include: 113: 62: 241: 142: 52: 31: 437:
What is 802.1x Security Authentication for Wireless Networks?
289:"Get IEEE 802: Local And Metropolitan Area Network Standard" 224:
as the minimum that will be required for account setup.
128:
assignment is needed, and in certain configurations, an
271:, Cisco Secure Access Control System (ACS) Server... 116:
Server (also known as an Authentication Server or an
321:"802.1X Authenticated Wireless Access Overview" 34:segment that seeks to be authenticated by an 8: 156:Supplicants include but are not limited to: 69:A supplicant, in some contexts, refers to a 38:attached to the other end of that link. The 227:On a Windows machine, taking an example of 57:IEEE 802.1x network-diagram example. The 363:"WPA2-Enterprise and 802.1x Simplified" 280: 420:ESG Open 802.1x Supplicant initiative 7: 425:Understanding 802.1x authentication 255:Note that IAS was being used up to 122:Dynamic Host Configuration Protocol 431:Cisco Secure Access Control System 14: 384:"To set up 802.1x authentication" 342:"How 802.1x authentication works" 134:Internet Authentication Service 99:settings appropriately set for 1: 27:is an entity at one end of a 16:Part of IEEE 802.1X standard 124:(DHCP) server if automatic 480: 160:Windows 2000/XP built in 247: 233:Network Interface Card 195:Network Access Manager 148: 66: 245: 146: 138:Network Policy Server 56: 445:on Microsoft Technet 44:software application 257:Windows Server 2003 21:computer networking 248: 149: 67: 301:on August 5, 2011 187:OS 10.3 or higher 84:Internet Protocol 80:personal computer 471: 395: 394: 392: 390: 380: 374: 373: 371: 369: 359: 353: 352: 350: 348: 338: 332: 331: 329: 327: 317: 311: 310: 308: 306: 300: 294:. Archived from 293: 285: 182:Internet Connect 130:Active Directory 479: 478: 474: 473: 472: 470: 469: 468: 454: 453: 416: 404: 399: 398: 388: 386: 382: 381: 377: 367: 365: 361: 360: 356: 346: 344: 340: 339: 335: 325: 323: 319: 318: 314: 304: 302: 298: 291: 287: 286: 282: 277: 253: 218: 154: 152:Supplicant list 109: 92: 17: 12: 11: 5: 477: 475: 467: 466: 456: 455: 452: 451: 446: 440: 434: 428: 422: 415: 414:External links 412: 411: 410: 403: 400: 397: 396: 375: 354: 333: 312: 279: 278: 276: 273: 252: 249: 217: 214: 213: 212: 207: 205:wpa_supplicant 202: 199: 196: 190: 189: 188: 175: 174: 173: 172:Service Pack 2 167: 166:Service Pack 4 153: 150: 108: 105: 91: 88: 29:point-to-point 15: 13: 10: 9: 6: 4: 3: 2: 476: 465: 462: 461: 459: 449: 447: 444: 441: 438: 435: 432: 429: 426: 423: 421: 418: 417: 413: 409: 406: 405: 401: 385: 379: 376: 364: 358: 355: 343: 337: 334: 322: 316: 313: 297: 290: 284: 281: 274: 272: 270: 266: 262: 258: 250: 244: 240: 238: 234: 230: 225: 223: 215: 211: 208: 206: 203: 200: 197: 194: 191: 186: 185: 183: 179: 176: 171: 168: 165: 162: 161: 159: 158: 157: 151: 145: 141: 139: 135: 131: 127: 123: 119: 118:Authenticator 115: 106: 104: 102: 97: 89: 87: 85: 81: 76: 72: 64: 60: 55: 51: 49: 45: 41: 37: 36:authenticator 33: 30: 26: 22: 427:on Microsoft 387:. Retrieved 378: 366:. Retrieved 357: 345:. Retrieved 336: 324:. Retrieved 315: 303:. Retrieved 296:the original 283: 254: 226: 219: 164:Windows 2000 155: 110: 93: 74: 70: 68: 24: 18: 450:on SecureW2 389:November 7, 347:November 8, 326:November 8, 305:November 7, 237:IEEE 802.1X 222:MAC address 210:Xsupplicant 184:" utility) 180:built in (" 101:IEEE 802.1X 96:IEEE 802.1X 40:IEEE 802.1X 439:on Netgear 408:Supplicant 275:References 269:FreeRADIUS 193:AnyConnect 170:Windows XP 126:IP address 25:supplicant 229:Windows 8 216:Mechanism 136:(IAS) or 464:IEEE 802 458:Category 433:on Cisco 402:See also 201:SecureW2 178:Mac OS X 90:Overview 73:or to a 368:May 23, 198:Odyssey 48:network 114:RADIUS 107:Access 75:client 63:uplink 299:(PDF) 292:(PDF) 251:Notes 120:), a 82:, an 391:2014 370:2017 349:2014 328:2014 307:2014 265:2012 261:2008 71:user 23:, a 59:hub 32:LAN 19:In 460:: 263:, 393:. 372:. 351:. 330:. 309:.

Index

computer networking
point-to-point
LAN
authenticator
IEEE 802.1X
software application
network

hub
uplink
personal computer
Internet Protocol
IEEE 802.1X
IEEE 802.1X
RADIUS
Authenticator
Dynamic Host Configuration Protocol
IP address
Active Directory
Internet Authentication Service
Network Policy Server

Windows 2000
Windows XP
Mac OS X
Internet Connect
AnyConnect
wpa_supplicant
Xsupplicant
MAC address

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.