6 the extension and optimization of 802.1x, 6 the extension and optimization of 802.1x -146 – PLANET WGSW-52040 User Manual
Page 367

Figure 42-12: the Authentication Flow of 802.1x EAP Termination Mode
42.1.6 The Extension and Optimization of 802.1x
Besides supporting the port- based access authentication method specified by the protocol,
devices also extend and optimize it when implementing the EAP relay mode and EAP
termination mode of 802.1x.
Supports some applications in the case of which one physical port can have more than
one users
There are three access control methods (the methods to authenticate users): port-based,
MAC-based and user-based (IP address+ MAC address+ port).
When the port-based method is used, as long as the first user of this port passes the
authentication, all the other users can access the network resources without being
authenticated. However, once the first user is offline, the network won’t be available
to all the other users.
42-146
- FNSW-1601 (2 pages)
- FNSW-1601 (2 pages)
- FGSW-1816HPS (110 pages)
- FGSW-1816HPS (2 pages)
- FGSW-1816HPS (105 pages)
- WGSD-10020HP (16 pages)
- GS-5220-16S8CR (432 pages)
- FGSD-1022P (12 pages)
- FGSD-1022P (226 pages)
- FGSD-910P (28 pages)
- FGSW-1602RS (30 pages)
- FGSW-2402S (39 pages)
- FGSW-2620PVS (50 pages)
- FGSW-2624SF (2 pages)
- FGSW-2620VM (213 pages)
- FGSW-2620VM (2 pages)
- FGSW-2624SF (2 pages)
- FGSW-2620VM (96 pages)
- FGSW-2620 (2 pages)
- FGSW-2620CS (81 pages)
- FGSW-2620CS (2 pages)
- FGSW-2620CS (80 pages)
- FGSW-2620CS (2 pages)
- FGSW-2840 (2 pages)
- FGSW-4840S (263 pages)
- FGSW-4840S (2 pages)
- FGSW-4840S (38 pages)
- FNSW-1600P (20 pages)
- FNSW-1600S (33 pages)
- FNSW-2400PS (2 pages)
- FNSW-2400PS (70 pages)
- FNSW-1602S (43 pages)
- FNSW-2402S (39 pages)
- FNSW-4800 (2 pages)
- FNSW-2401CS (38 pages)
- FSD-1604 (12 pages)
- FSD-2405 (18 pages)
- FSD-1606 (2 pages)
- FSD-803 (2 pages)
- FSD-803 (2 pages)
- FSD-504HP (2 pages)
- FSD-805ST (20 pages)
- FSD-804P (21 pages)
- FSD-808P (20 pages)
- FSD-808P (22 pages)