Overview of Security Methods
Table 3-5 MAC / 802.1X Precedence States (Continued)
802.1X
MAC
Port
Port
Control
Control
Auto
Disabled
Auto
Disabled
Auto
Disabled
Auto
Disabled
Auto
Disabled
Force
Enabled
Unauthori-
zation
Force
Enabled
Unauthori-
zation
Force
Enabled
Unauthori-
zation
Force
Enabled
Unauthori-
zation
3-24
Accessing Local Management
Default
Authen-
Policy
ticated?
Exists?
Yes
Don't
Care
Yes
Yes
Yes
No
No
Yes
No
No
Yes
Don't
Care
Yes
Yes
Yes
No
No
Yes
Autho-
rized
Policy
Exists?
Action
•
Yes
802.1X performs authentication.
•
Frames are forwarded according
to authorized policy.
•
No
802.1X performs authentication.
•
Frames are forwarded according
to default policy.
•
No
802.1X performs authentication.
•
Frames are forwarded.
•
Don't
802.1X performs authentication.
Care
•
Frames are forwarded according
to default policy.
•
Don't
802.1X performs authentication.
Care
•
Frames are discarded.
•
Yes
MAC performs authentication.
•
Frames are forwarded according
to authorized policy.
•
No
MAC performs authentication.
•
Frames are forwarded according
to default policy.
•
No
MAC performs authentication.
•
Frames are forwarded.
•
Don't
MAC performs authentication.
Care
•
Frames are forwarded according
to default policy.