InkBridge Networks - A new name for Network RADIUS

Client Case Study: 802.1X implementation

When months of 802.1X implementation attempts failed, we diagnosed firmware bugs and leveraged vendor relationships to deliver a working solution.

One of our clients had customer-visible issues in their 802.1X implementation after weeks of attempting setup. Despite a lot of effort from their internal team, they were no further ahead than when they started. 

The problem: An unsuccessful DIY 802.1X implementation 

Undertaking 802.1X implementation is a daunting experience for many organisations. There are detailed requirements on end-user PCs, switches, servers, certificates, and more. If any of these requirements are not met, your 802.1X implementation will not work. 

The client called on us for 802.1X implementation service to help resolve their complex authentication challenges across multiple vendor platforms. 

Why 802.1X implementation projects fail (and why expertise matters) 

Network access control using 802.1X and RADIUS involves coordination between multiple systems: client devices, network switches, authentication servers, and certificate authorities. 

Each component must be configured correctly, and they must all work together seamlessly. A single misconfiguration anywhere in the 802.1X implementation chain breaks authentication for everyone.  

The solution: Pattern recognition and vendor relationships 

We tracked one problem down to firmware issues on the networking equipment. Rather than spending weeks debugging protocol traces during the 802.1X implementation, we recognised the symptoms immediately - we'd seen this exact issue with other clients. 

We worked with the vendor to fix those issues, along with subsequent issues that resulted from the firmware changes. By capitalising on experience gained from additional 802.1X implementation problems we'd seen with our other customers, we customised a solution for this client. 

The relationship advantage: When our clients have issues with major vendors like Cisco or Microsoft during their 802.1X implementation, they typically call first-tier tech support who ask if they've "tried turning it off and on again."  

We call the director, product manager, or engineer who wrote the code directly.  

We worked with a second equipment vendor and tracked down undocumented features of their product that would simplify the network configuration. Finally, we fixed intermittent failures that were caused by interaction effects between our product and newer versions of Active Directory.  

Implementation: Vendor and standards collaboration 

Because we've been working in network authentication for over two decades, we have established relationships with engineering teams at major vendors. When Microsoft releases updates, they test them with FreeRADIUS. When we write new standards, we collaborate with Microsoft's implementation teams to ensure compatibility. 

This means our clients benefit from vendor relationships that bypass traditional support queues. Instead of navigating through multiple support tiers, we get problems directly to the engineers who can prioritise fixes in upcoming releases. 

Worth noting: Not all vendors are willing to work with us through unforeseen 802.1X implementation compatibility issues. The vendors that are not willing to work with us generally have much higher interoperability problems, and our customers see much higher problems using that vendor equipment. We are unable to recommend that vendor equipment to our other customers. 

Industry standards leadership 

We are also heavily involved in shaping the standards that govern network authentication. 

Our work with the Wireless Broadband Alliance includes advancing RADIUS Accounting standards and contributing to OpenRoaming initiatives that enable seamless authentication across Wi-Fi networks.  

Through collaboration with the Wi-Fi Alliance, we ensure that 802.1X implementations meet rigorous standards for interoperability and security.  

This standards leadership means our clients benefit from implementations that are built on protocols we helped create, tested against frameworks we helped develop, and supported by the industry relationships that come from being at the table when authentication standards are defined.  

Results: Complex 802.1X implementation, seamless experience 

The end result was that the customer's 802.1X implementation met all of their requirements. A complex set of features was deployed across a wide range of networking equipment, which was supplied by a number of different vendors. 

Administrators gained complete visibility into who was accessing their network, when, and from which devices. Security policies could be enforced consistently across the entire infrastructure. 

To a normal user of the network, however, the additional network security from the 802.1X implementation was unobtrusive. Users could continue to access the network in their traditional manner, with authentication happening transparently in the background. 

Frequently asked questions on 802.1X implementation challenges 

Key lesson: Outsourced expertise  

802.1X implementation has a much higher chance of success when you have access to the accumulated knowledge of someone who’s solved these problems before.  

Would you rather spend months debugging complicated protocols during your 802.1X implementation, or call someone who recognises the problem immediately and knows exactly how to fix it? 

Ready to stop over-engineering your network infrastructure?  

InkBridge Networks has extensive experience with a wide range of equipment and deployment scenarios for 802.1X implementation projects. We work with major OS and equipment vendors to debug and correct deficiencies in their products, and we've added new features to our products to make 802.1X implementation even easier. 

Our team of seasoned experts has encountered and solved nearly every conceivable network access control challenge in 802.1X implementation. If you're looking for insights from the architects behind some of the internet's most foundational authentication systems, you can request a quote for network security solutions here

Related Articles

Authorized users only: Why use RADIUS and 802.1x to control network access?

Authorized users only: Why use RADIUS and 802.1x to control network access?

Controlling which users and what devices are on your network has become significantly more complex in the current corporate environment. Network administrators must adapt to wireless access, remote working, bring-your-own-device scenarios and cloud computing. 

How to configure a RADIUS server

How to configure a RADIUS server

Even though clients may prefer to configure their own system, some clients are unsure of how to configure a RADIUS server. Although the process can be complex, clients can learn how to setup a RADIUS server themselves. Alternatively, our team of experts is happy to set up a RADIUS configuration for any business.