1-3
Authorized state and unauthorized state
The device uses the authentication server to authenticate a client trying to access the LAN and controls
the status of the controlled port depending on the authentication result, putting the controlled port in the
authorized state or unauthorized state, as shown in
Figure 1-2
.
Figure 1-2
Authorized/unauthorized status of a controlled port
You can set the access control mode of a specified port to control the authorization status. The access
control modes include:
z
authorized-force
: Places the port in the authorized state, allowing users of the ports to access the
network without authentication.
z
unauthorized-force
: Places the port in the unauthorized state, denying any access requests from
users of the ports.
z
auto
: Places the port in the unauthorized state initially to allow only EAPOL frames to pass, and
turns the ports into the authorized state to allow access to the network after the users pass
authentication. This is the most common choice.
Control direction
In the unauthorized state, the controlled port can be set to deny traffic to and from the client or just the
traffic from the client.
Currently, your device can only be set to deny traffic from the client.
EAP over LANs
EAPOL frame format
EAPOL, defined in 802.1X, is intended to carry EAP protocol packets between clients and devices over
LANs.
Figure 1-3
shows the EAPOL frame format.
Содержание 4500G PWR 24-Port
Страница 200: ...1 5 ProviderB GigabitEthernet1 0 2 undo stp enable ProviderB GigabitEthernet1 0 2 bpdu tunnel dot1q stp ...
Страница 252: ...1 7 Clearing ARP entries from the ARP table may cause communication failures ...
Страница 362: ...i Table of Contents 1 Dual Stack Configuration 1 1 Dual Stack Overview 1 1 Configuring Dual Stack 1 1 ...
Страница 407: ...1 8 1 1 ms 1 ms 1 ms 1 1 6 1 2 1 ms 1 ms 1 ms 1 1 4 1 3 1 ms 1 ms 1 ms 1 1 2 2 Trace complete ...
Страница 786: ...1 16 3 In the case of PIM SM use the display current configuration command to check the BSR and RP information ...
Страница 1387: ...1 23 ...
Страница 1443: ...i Table of Contents 1 URPF Configuration 1 1 URPF Overview 1 1 What is URPF 1 1 How URPF Works 1 1 Configuring URPF 1 2 ...
Страница 1720: ...ii Single Device Upgrade 3 4 IRF System Upgrade 3 5 ...