Network Authentication

802.1X, EAP, RADIUS, TACACS+, and other network authentication protocols.

The Digital Gatekeeper: Answering "Who Are You?"

Imagine a secure, exclusive building, perhaps the headquarters of a global tech company or a top-secret government facility. At the entrance, a formidable security desk is the first thing every visitor encounters. Before anyone is granted entry, a guard asks a fundamental question: "Who are you, and what is your business here?" To prove their identity, a person must present valid credentials: an employee badge, a government-issued ID, or a visitor's pass. Only after this identity is verified against a list of authorized personnel is the person allowed to enter.

is the digital equivalent of this security checkpoint. It is the process by which a network asks every connecting user and device that same fundamental question. In a world where corporate networks house sensitive financial data, intellectual property, and personal information, simply having an open network jack or a publicly broadcasted Wi-Fi name is akin to leaving the front door of that secure facility wide open. Network authentication is the essential gatekeeper that ensures only trusted and verified entities can gain access to the valuable resources within.

The AAA Framework: The Pillars of Access Control

Secure network access is built upon a robust framework known as AAA, which stands for Authentication, Authorization, and Accounting. These three pillars work together to provide comprehensive access control.

1. Authentication: Proving Your Identity

This is the first step: confirming that users or devices are who they claim to be. In our building analogy, this is the act of showing your ID card to the guard. In the digital world, credentials can take several forms, often categorized by factors:

  • Something you know: The most common form of authentication. This includes passwords and PINs. It is simple but can be weak if users choose easily guessable passwords.
  • Something you have: This refers to a physical object in your possession, such as a smart card, a hardware security token (like a YubiKey), or your smartphone receiving a one-time passcode.
  • Something you are: This involves biometric data, which is unique to you as an individual. Examples include your fingerprint, a facial scan, or an iris scan.

The strongest authentication systems use a combination of these factors, known as Multi-Factor Authentication (MFA). For instance, accessing a system might require both a password (something you know) and a code from your phone (something you have).

2. Authorization: Defining Your Permissions

Once your identity is confirmed, the next question is, "What are you allowed to do?" This is authorization. In our analogy, the security guard verifies your employee ID (authentication) and then checks your role. An intern's badge might only grant access to the ground floor, while an executive's badge might unlock every door in the building.

In a network, authorization dictates a user's level of access. After authenticating, a central server instructs the network equipment (like a switch or access point) what rules to apply. This can include:

  • Assigning the user to a specific Virtual LAN (VLAN), for example, placing finance department employees in the secure 'Finance_VLAN'.
  • Applying specific Access Control Lists (ACLs) or firewall rules to their connection.
  • Implementing Quality of Service (QoS) policies to prioritize their traffic (e.g., giving higher priority to a manager's VoIP phone calls).

3. Accounting: Tracking Your Activity

The final pillar is accounting, which involves collecting and logging data about what the user did while connected. It is the building's security logbook, recording who entered, at what time, which rooms they visited, and when they left.

Network accounting tracks metrics like the duration of a user's session, the amount of data transferred, the resources accessed, and the commands issued (especially important for administrative access to devices). This data is invaluable for:

  • Security Auditing & Forensics: Investigating security incidents by providing a clear trail of activity.
  • Billing: Charging users based on their network usage, as is common with internet service providers.
  • Capacity Planning: Analyzing usage patterns to plan for future network upgrades.

RADIUS and TACACS+: The Languages of AAA

To implement the AAA framework in a scalable way, centralized protocols are needed. Two protocols have dominated this space: RADIUS and its main competitor, TACACS+.

RADIUS (Remote Authentication Dial-In User Service)

is the industry-standard protocol for providing centralized AAA for network access. It operates on a client-server model. Network devices like switches and wireless access points act as RADIUS clients. They do not store user databases themselves; instead, they forward all authentication requests to a central RADIUS server. The RADIUS server holds the user database and security policies, makes the access decision, and sends the verdict back to the client device.

One limitation of RADIUS is that it combines the authentication and authorization processes. An 'Access-Accept' packet sent from the server to the switch contains both the confirmation of identity and all authorization attributes in a single message. While efficient, this can be less flexible than separating the steps. Additionally, RADIUS only encrypts the user's password within the 'Access-Request' packet, leaving the rest of the information, such as the username and accounting data, unprotected as it travels across the network.

TACACS+ (Terminal Access Controller Access-Control System Plus)

is a protocol developed by Cisco that is often seen as an alternative to RADIUS, particularly for a specific use case: securing administrative access to network devices themselves. While RADIUS is focused on controlling who gets onto the network, TACACS+ is focused on controlling who can log in to a router or switch and what commands they are allowed to execute.

TACACS+ offers several key advantages over RADIUS in this context:

  • Separation of AAA: TACACS+ treats each part of the AAA framework as a separate process. A device first authenticates, then a separate authorization process determines their command privileges, and accounting is also handled independently. This provides greater flexibility and granular control.
  • Full Packet Encryption: Unlike RADIUS, TACACS+ encrypts the entire body of the packet exchanged between the device and the server. This means not just the password, but the username, authorization information, and all commands are kept confidential. This is a significant security improvement.
  • TCP-based Reliability: TACACS+ uses TCP as its transport protocol, which provides a reliable, connection-oriented session. RADIUS uses UDP, which is faster but less reliable.

EAP and 802.1X: The Modern Framework for Access Control

While RADIUS provides the backend infrastructure, a standardized way is needed for the end device and the network switch/access point to conduct the authentication process itself. This is accomplished through the synergy of two powerful standards: the Extensible Authentication Protocol (EAP) and IEEE 802.1X.

EAP (Extensible Authentication Protocol): The Flexible Conversation

is not an authentication method itself. Instead, it is a highly flexible framework or a common language for authentication conversations. It allows a client and an authentication server to negotiate and use one of many different authentication methods, known as EAP methods. This is crucial because different scenarios demand different levels of security.

Popular EAP methods include:

  • EAP-TLS (Transport Layer Security): Extremely secure. It requires both the server and the client to have a digital certificate, providing strong mutual authentication.
  • PEAP (Protected EAP): A very common method. The server presents a certificate to the client, creating a secure TLS tunnel. Inside this encrypted tunnel, the client can then safely authenticate using a weaker method, typically a username and password (MS-CHAPv2).
  • EAP-TTLS (Tunneled TLS): Similar to PEAP, it also creates a TLS tunnel but is more flexible in the authentication methods that can be used inside.

IEEE 802.1X: Port-Based Security Enforcement

is the standard that brings authentication to the physical point of connection. It defines a mechanism for Port-Based Network Access Control (PNAC).

When a device plugs into an 802.1X-enabled switch port, the port is initially in a blocked state. It acts like a closed gate, allowing only EAP messages to pass through. All other traffic: web, email, etc., is dropped. The switch (Authenticator) then uses EAP to challenge the device (Supplicant) to prove its identity. The Authenticator relays this conversation to a RADIUS server (Authentication Server). Only when the RADIUS server successfully authenticates the supplicant and sends an 'Access-Accept' message back does the switch open the port and allow normal traffic to flow. This mechanism effectively turns every single port on a switch into an individually controlled security checkpoint.

Putting It All Together: The Authentication Flow

Let's walk through a typical authentication process in a corporate environment using all these components together. A new employee, Jane, tries to connect her laptop to the company Wi-Fi.

  1. Connection Attempt: Jane selects the corporate Wi-Fi SSID. Her laptop (the Supplicant) attempts to connect to a wireless access point (the Authenticator).
  2. 802.1X Initiation: The access point sees the new device. Since the network is secured with WPA2/WPA3-Enterprise, the AP initiates the 802.1X process. It blocks all regular traffic and sends an EAP message to the laptop, asking for its identity.
  3. EAP/RADIUS Conversation: The laptop responds with Jane's username. The AP wraps this EAP message inside a RADIUS 'Access-Request' packet and sends it to the central RADIUS server. The RADIUS server then begins a secure PEAP handshake, creating a TLS tunnel back to Jane's laptop (all relayed through the AP).
  4. Credential Verification: Inside this encrypted tunnel, Jane's laptop securely sends her password. The RADIUS server verifies the username and password against the company's Active Directory database.
  5. Authorization Decision: Since the credentials are correct, the RADIUS server sends a 'RADIUS Access-Accept' packet back to the access point. This packet contains authorization attributes. Based on Jane's role in Active Directory as a member of the marketing department, the server instructs the AP to place her in 'VLAN 30' (Marketing) and apply the 'Marketing-ACL'.
  6. Access Granted: The access point applies the VLAN and ACL settings to Jane's wireless session and sends a final EAP-Success message. Jane is now securely connected to the network with the appropriate level of access for her role.
  7. Accounting Start: The access point sends a 'RADIUS Accounting-Start' packet to the server, logging the start of Jane's session. When she disconnects, an 'Accounting-Stop' packet will be sent, completing the AAA process.
    Network Authentication | Teleinf Edu