Dell PowerConnect J-EX4200-24T Software Manual page 2328

J series; j-ex series
Table of Contents

Advertisement

Dell PowerConnect J-Series Ethernet Switch Complete Software Guide for Junos OS
2256
Figure 46: Authentication Process Flow for a J-EX Series Switch
The basic authentication process works like this:
Authentication is initiated by an end device sending an EAP request or a data packet.
1.
If the MAC address of the end device is in the static MAC bypass list or the
2.
authentication whitelist, the switch accepts the end device without querying the
authentication server and allows the end device to access the LAN.
If the MAC address is not in the static MAC bypass list or the authentication whitelist,
3.
the switch checks whether an
If an authenticator is not configured, the switch checks for captive portal
configuration—skip to Step 6.
If an authenticator is configured:
The switch checks whether the
a.
interface. If
mac-radius restrict
authentication—skip to Step 5. If it is configured, go on to Step 2.
The switch sends either an EAP request (if the end device initiated contact with a
b.
data packet) or an EAP response (if the end device initiated contact with an
EAPOL-start message).
If there is no response, the switch tries sending an EAP request two more times.
c.
statement is configured on the interface.
authenticator
statement is configured on the
mac-radius restrict
is configured, the switch does not attempt 802.1X

Advertisement

Table of Contents
loading

Table of Contents