Figure 52. example of the authenticator role – Allied Telesis AT-S106 User Manual
Page 168
Chapter 14: 802.1x Port-based Network Access Control
168
Figure 52 illustrates the practical examples of these three authenticator
port control settings when a RADIUS server is in your network.
Figure 52. Example of the Authenticator Role
Port 20 is set to Auto. The end node connected to the port must use its
802.1x client software and provide a user name and password to send
or receive traffic from the switch.
Port 34 is set to the Force-authorized setting so that the end node
connected to the port does not have to provide a user name or
password to send or receive traffic from the switch. In the example, the
node is the RADIUS authentication server. Since the server cannot
authenticate itself, its port must be set to Force-authorized in order for
it to pass traffic through the port.
Port 37 is an example of a port set to Force-unauthorized to prevent
anyone from using the port.
1869
Port 34
802.1x Port Control:
Setting: Force-authorized
RADIUS
Authentication
Server
Port 37
802.1x Port Control:
Setting: Force-unauthorized
Port 20
802.1x Port Control
Setting: Auto
Supplicant with
802.1x Client
Software