
User manual
44
www.3onedata.com
6.7.3 IEEE 802.1X
IEEE 802.1x authentication architecture with a "controlled port" and "uncontrollable port" logic
functions, which can achieve the separation of business and certification. After the user passed the
authentication, business stream and certification flow should separate, no special requirements on the
follow-up packet processing, the business can be very flexible, in particular, have a great advantage in
carrying out the business of broadband multicast, all business are not subject to certification way limit.
802.1X authentication involves three parties:
Supplicant
:
It‟s the users or customers want to get the authentication.
Authentication server:
Such as RADIUS server.
Authenticator
:
Such as wireless access points, switches, etc.
Our device can play two roles of the certification system and the authentication server, you can use
additional authentication server, while supporting the expenses system.
(
Figure 6.7.3
)
802.1x
802.1x is used to enhance the security of the authentication.
Radius Server Remote/Local