Mac Authentication Configuration; Mac Authentication Overview; Radius-Based Mac Authentication - 3Com 4500G Family Configuration Manual

24/48 port
Hide thumbs Also See for 4500G Family:
Table of Contents

Advertisement

1

MAC Authentication Configuration

Support for guest VLAN of MAC authentication is added in V05.02.00P19 of 3Com Switch 4500G. For
details, refer to
Guest VLAN of MAC Authentication
When configuring MAC authentication, go to these sections for information you are interested in:

MAC Authentication Overview

Related Concepts
Configuring MAC Authentication
Displaying and Maintaining MAC Authentication
MAC Authentication Configuration Examples
MAC Authentication Overview
MAC authentication provides a way for authenticating users based on ports and MAC addresses. Once
detecting a new MAC address, the device initiates the authentication process. MAC authentication
requires neither client software to be installed on the hosts, nor any username or password to be
entered by users during authentication.
Currently, the device supports two MAC authentication modes: Remote Authentication Dial-In User
Service (RADIUS) based MAC authentication and local MAC authentication. For detailed information
about RADIUS authentication and local authentication, refer to AAA Configuration of the Security
Volume.
MAC authentication supports two types of usernames:
MAC address, where the MAC address of a user serves as both the username and password.
Fixed username, where all users use the same preconfigured username and password for
authentication, regardless of the MAC addresses.

RADIUS-Based MAC Authentication

In RADIUS-based MAC authentication, the device serves as a RADIUS client and requires a RADIUS
server to cooperate with it.
If the type of username is MAC address, the device forwards a detected MAC address as the
username and password to the RADIUS server for authentication of the user.
If the type of username is fixed username, the device sends the same username and password
configured locally to the RADIUS server for authentication of each user.
If the authentication succeeds, the user will be granted permission to access the network resources.
and
Configuring a Guest
1-1
VLAN.

Hide quick links:

Advertisement

Chapters

Table of Contents
loading

Table of Contents