beautypg.com

Chapter 42, Authentication introduction and configuration – Allied Telesis AlliedWare Plus Operating System Version 5.4.4C (x310-26FT,x310-26FP,x310-50FT,x310-50FP) User Manual

Page 1097

background image

Software Reference for x310 Series Switches

C613-50046-01 REV A

AlliedWare Plus

TM

Operating System - Version 5.4.4C

42.1

Chapter 42: Authentication Introduction and

Configuration

Authentication Introduction......................................................................................................... 42.2

Configuring a Guest VLAN...................................................................................................... 42.2

802.1X-Authentication .................................................................................................................... 42.3
Web-Authentication ........................................................................................................................ 42.4

What is Web-Authentication? ............................................................................................... 42.4
Web-Authentication Basics .................................................................................................... 42.4
Configuring Web-Authentication ........................................................................................ 42.6
Starting a Web-Authentication Session............................................................................. 42.8
Support for Protocols Underlying Web-Authentication............................................42.10
Web-Authentication Timeout Connect ...........................................................................42.14
Web Authorization Proxy......................................................................................................42.15

MAC-Authentication ......................................................................................................................42.16

Why is MAC-Authentication Required? ...........................................................................42.16
How Does MAC-Authentication Work?............................................................................42.16
Configuring MAC-Authentication......................................................................................42.17

Tri-Authentication...........................................................................................................................42.18
Tri-Authentication Configuration..............................................................................................42.19
Two-step Authentication .............................................................................................................42.21
Ensuring Authentication Methods Require Different Usernames and Passwords..42.22
Roaming Authentication ..............................................................................................................42.23

Roaming Authentication Overview...................................................................................42.24
Roaming Authentication Feature Interactions .............................................................42.25

Unauthenticated Supplicant Traffic .........................................................................................42.26

Deciding When a Supplicant Fails Authentication ......................................................42.28
Failed Authentication VLAN.................................................................................................42.29
Limitations on Allowed Feature Combinations ............................................................42.29