The Extension And Optimization Of 802.1X - Edge-Core ES4626 User Manual

L3 gigabit ethernet switch
Hide thumbs Also See for ES4626:
Table of Contents

Advertisement

Fig 23-12 the Authentication Flow of 802.1x EAP Termination Mode

23.1.6 The Extension and Optimization of 802.1x

Besides supporting the port- based access authentication method specified by the
protocol, devices also extend and optimize it when implementing the EAP relay mode
and EAP termination mode of 802.1x.
Supports some applications in the case of which one physical port can have
more than one users
There are three access control methods (the methods to authenticate users):
port-based, MAC-based and user-based (IP address+ MAC address+ port).
When the port-based method is used, as long as the first user of this port
passes the authentication, all the other users can access the network
resources without being authenticated. However, once the first user is
offline, the network won't be available to all the other users.
When the MAC-based method is used, all the users accessing a port
829

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Es4650Es4626 l3Es4650 l3

Table of Contents