What You Need To Know; Mac Authentication - ZyXEL Communications XS3800-28 User Manual

28-port 10gbe l3 managed switch
Hide thumbs Also See for XS3800-28:
Table of Contents

Advertisement

18.1.2 Wha t Yo u Ne e d to Kno w
IEEE 802.1x Authe ntic a tio n
The following figure illustrates how a client connecting to a IEEE 802.1x authentication enabled port goes
through a validation process. The Switch prompts the client for login information in the form of a user
name and password after the client responds to its identity request. When the client provides the login
credentials, the Switch sends an authentication request to a RADIUS server. The RADIUS server validates
whether this client is allowed access to the port.
Fig ure 167
18.1.3 MAC Authe ntic a tio n
MAC authentication works in a very similar way to IEEE 802.1x authentication. The main difference is that
the Switch does not prompt the client for login credentials. The login credentials are based on the
source MAC address of the client connecting to a port on the Switch along with a password configured
specifically for MAC authentication on the Switch.
Chapter 18 Port Authentication
IEEE 802.1x Authentication Process
XS3800-28 User's Guide
221

Advertisement

Table of Contents
loading

Table of Contents