No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


NE40E V800R010C10SPC500 Configuration Guide - User Access 01

This is NE40E V800R010C10SPC500 Configuration Guide - User Access
Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Overview of 802.1X Access

Overview of 802.1X Access

IEEE 802.1X authentication allows only authorized users or devices to access a network, which improves network security.

IEEE 802.1X is an IEEE standard for Port-based Network Access Control and is part of the IEEE 802.1X group of networking protocols. The standard adopts a client/server approach to authenticate users, preventing unauthorized users or devices from connecting to a LAN.

Before granting access to services, IEEE 802.1X authenticates users or devices attached to controlled interfaces on the router. The access to controlled interfaces is allowed or denied as determined by the authorization status of controlled interfaces. Controlled interfaces in the unauthorized state will deny the user or device access. The authorization status (authorized or unauthorized) of controlled interfaces is controlled by the router based on authentication results from the authentication server. Before a user or device is authenticated, 802.1X access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic to pass through the Ethernet interface to which the user or device is connected. After authentication is successful, normal traffic can pass through the Ethernet interface. This mechanism improves network security by allowing only authorized users or devices to access the network.


Services are interrupted if the memory size of the master MPU is inconsistent with that of the slave MPU.

Updated: 2019-01-03

Document ID: EDOC1100055031

Views: 17134

Downloads: 69

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next