No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

NE40E V800R010C10SPC500 Feature Description - Security 01

This is NE40E V800R010C10SPC500 Feature Description - Security
Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Application Scenarios for 802.1x Access

Application Scenarios for 802.1x Access

Typical Applications of 802.1X Port-based Authentication

The networking of 802.1X port-based authentication is similar to that of IPoE, IPoEoVLAN, and IPoEoQ. The supplicant's Ethernet interface encapsulates EAP packets into EAP over LAN (EAPOL) packets, which can reach the authenticator directly or through a LAN switch or DSLAM after the LAN switch adds VLAN tags or the DSLAM performs AAL5 encapsulation.

Through EAPOL packet decapsulation and VLAN tag identification, the authenticator obtains user physical information, user names, and passwords from the packets to prepare data for user access authentication.

Figure 19-6 shows the typical networking for 802.1X port-based authentication. The authenticator performs access authentication for the supplicant.

Figure 19-6 Networking for 802.1X port-based authentication

Figure 19-7 shows the networking for 802.1XoEoV port-based authentication. Single VLAN tags are added to supplicant packets on the switch, and the packets are then sent to the authenticator for access authentication.

Figure 19-7 Networking for 802.1XoEoV port-based authentication

Figure 19-8 shows the networking for 802.1XoEoQ port-based authentication. Single VLAN tags are added to supplicant packets on each switch, and the packets are then sent to the authenticator for access authentication.

Figure 19-8 Networking for 802.1XoEoQ port-based authentication

Translation
Download
Updated: 2019-01-03

Document ID: EDOC1100055047

Views: 12480

Downloads: 29

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next