Key Concepts
BreezeMAX Wi² and BreezeACCESS Wi² System Manual
73
5.1.1.2.1
Authentication Examples
5.1.1.2.1.1 MAC and 802.1X enabled, mandatory 802.1X authentication disabled
Wireless client stations are automatically authenticated by their MAC address.
If MAC authentication succeeds,
the client station gains access. Next, the client station can
initiate an 802.1X session, causing 802.1X authentication to take place. The result of this
authentication then takes precedence over the MAC authentication result.
(When MAC mandatory disabled.) If MAC authentication fails,
the client station does not
gain access but can still initiate an 802.1X session, causing 802.1X authentication to take place.
If the result of this authentication is successful, then the client station gains access.
(When MAC mandatory enabled.) If MAC authentication fails,
the client station does not gain
access regardless of the 802.1X result.
5.1.1.2.1.2 MAC and 802.1X Enabled, Mandatory 802.1X Authentication Enabled
Wireless client stations are automatically authenticated by their MAC address. If MAC
authentication succeeds they do not gain access until 802.1X authentication is successful.
5.1.1.2.1.3 MAC Disabled and 802.1X Enabled, Mandatory 802.1X Authentication
Disabled
Wireless client stations automatically gain access to the network with no authentication required. If
the client station starts an 802.1X session, authentication takes place. If the result of this
authentication is failure, then the client station looses access to the network.
5.1.1.2.1.4 MAC Disabled and 802.1X Enabled, Mandatory 802.1X Authentication
Enabled
Wireless client stations gain access to the network only after successful 802.1X authentication.
5.1.2
Deployment in Conjunction with an Alvarion Service
Controller
Autonomous APs can also be used in conjunction with a service controller to create a public access
network infrastructure. In this type of deployment, all virtual network are access-controlled, which
means that the AP forwards all wireless user traffic to the service controller which handles user
authentication and access control.
To reach protected network resources, wireless users must successfully authenticate with the public
access interface that is provided by the service controller.
Summary of Contents for BreezeACCESS Wi2
Page 1: ...BreezeMAX Wi and BreezeACCESS Wi System Manual SW Version 5 2 June 2008 P N 215017 ...
Page 8: ...vi BreezeMAX Wi and BreezeACCESS Wi System Manual Legal Rights ...
Page 12: ......
Page 22: ...B 1 2 Using the Management Tool 220 B 1 3 Using Special Commands 222 ...
Page 32: ......
Page 56: ......
Page 116: ...94 BreezeMAX Wi and BreezeACCESS Wi System Manual Chapter 5 Working with Virtual Networks ...
Page 134: ......
Page 154: ...132 BreezeMAX Wi and BreezeACCESS Wi System Manual Chapter 7 Network Configuration ...
Page 170: ......
Page 190: ......
Page 223: ...Sample Local Mesh Deployments BreezeMAX Wi and BreezeACCESS Wi System Manual 201 ...
Page 224: ......
Page 240: ......
Page 246: ......