Allied Telesis AlliedWare Plus Operating System Version 5.4.4C (x310-26FT,x310-26FP,x310-50FT,x310-50FP) User Manual
Page 1123
Authentication Introduction and Configuration
Software Reference for x310 Series Switches
C613-50046-01 REV A
AlliedWare Plus
TM
Operating System - Version 5.4.4C
42.27
Table 42-1: Treatment of packets from unauthenticated supplicants
Switch port
configuration
No Guest VLAN configured
No Guest VLAN
configured, auth-fail
VLAN configured
Guest VLAN configured
Web-
authentication
configured
Packets from unauthenticated
supplicants are associated with
the Native VLAN of the port.
Packets from unauthenticated
supplicants are processed
according these rules:
■
Packets destined to the
WebAuth server IP address/
TCP port are forwarded to
the server (which may well
be the switch itself ).
■
DHCP packets are sent to
the CPU, to be processed by
a local DHCP server, or
relayed to another DHCP
server, depending on the
configuration of the switch.
■
DNS packets are forwarded
to the CPU, and then sent on
to a DNS server, if the switch
is configured with a DNS
server address.
■
ARP packets are forwarded
to the CPU, and an ARP
entry for the supplicant is
learned.
■
If web-auth forwarding is
enabled for particular types
of packets, then those
packets will be forwarded
within the Native VLAN
■
All other packets are
dropped.
Packets from
unauthenticated
supplicants are
associated with the
Native VLAN of the
port. If newly
connected supplicants
attempt 802.1X port
authentication or Web-
authentication and fail,
then they are moved to
the auth-fail VLAN.
Packets from unauthenticated
supplicants are associated with
the Guest VLAN of the port.
Packets from unauthenticated
supplicants are processed
according to these rules:
■
Packets destined to the
WebAuth server IP address/
TCP port are forwarded to
the server (which may well
be the switch itself ).
■
DHCP packets are sent to the
CPU, to be processed by a
local DHCP server, or relayed
to another DHCP server,
depending on the
configuration of the switch.
■
DNS packets are forwarded
to the CPU, and then sent on
to a DNS server, if the switch
is configured with a DNS
server address.
■
ARP packets are forwarded
to the CPU, and an ARP entry
for the supplicant is learned.
■
Drop all other packets
destined to the IP address of
the Guest VLAN.
■
Layer 2 forward packets
destined to other addresses
within the Guest VLAN.
■
All other packets are
dropped.
No Web-
authentication
configured
All non-eap packets from
unauthenticated supplicants
are dropped.
All non-eap packets
from unauthenticated
supplicants are
dropped.
Packets from unauthenticated
supplicants are associated with
the Guest VLAN of the port. The
packets are processed according
to these rules:
■
Drop packets destined to the
IP address of the Guest
VLAN.
■
Layer 2 forward packets
destined to other addresses
within the Guest VLAN.
■
Drop all other packets.