Chapter 42, Authentication introduction and configuration – Allied Telesis AlliedWare Plus Operating System Version 5.4.4C (x310-26FT,x310-26FP,x310-50FT,x310-50FP) User Manual
Page 1097
![background image](/manuals/427254/1097/background.png)
Software Reference for x310 Series Switches
C613-50046-01 REV A
AlliedWare Plus
TM
Operating System - Version 5.4.4C
42.1
Chapter 42: Authentication Introduction and
Configuration
802.1X-Authentication .................................................................................................................... 42.3
Web-Authentication ........................................................................................................................ 42.4
What is Web-Authentication? ............................................................................................... 42.4
Web-Authentication Basics .................................................................................................... 42.4
Configuring Web-Authentication ........................................................................................ 42.6
Starting a Web-Authentication Session............................................................................. 42.8
Support for Protocols Underlying Web-Authentication............................................42.10
Web-Authentication Timeout Connect ...........................................................................42.14
Web Authorization Proxy......................................................................................................42.15
Why is MAC-Authentication Required? ...........................................................................42.16
How Does MAC-Authentication Work?............................................................................42.16
Configuring MAC-Authentication......................................................................................42.17
Tri-Authentication...........................................................................................................................42.18
Tri-Authentication Configuration..............................................................................................42.19
Two-step Authentication .............................................................................................................42.21
Ensuring Authentication Methods Require Different Usernames and Passwords..42.22
Roaming Authentication ..............................................................................................................42.23
Roaming Authentication Overview...................................................................................42.24
Roaming Authentication Feature Interactions .............................................................42.25
Deciding When a Supplicant Fails Authentication ......................................................42.28
Failed Authentication VLAN.................................................................................................42.29
Limitations on Allowed Feature Combinations ............................................................42.29