No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

NE20E-S2 V800R010C10SPC500 Configuration Guide - Security 01

This is NE20E-S2 V800R010C10SPC500 Configuration Guide - Security
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Overview of 802.1X Port-based Authentication

Overview of 802.1X Port-based Authentication

IEEE 802.1X authentication allows only authorized users or devices to access a network, which improves network security.

802.1X port-based authentication allows only authorized users to access the network, improving network security.

The 802.1X protocol is an important concept of 802.1X port-based authentication. Before granting access to services, IEEE 802.1X authenticates users or devices attached to controlled ports on the router. The access to controlled ports is allowed or denied as determined by the authorization state of controlled ports. Controlled ports in the unauthorized state will deny the user or device access. Before a user or device functioning as the supplicant PAE gains access to various network services, the authenticator PAE authenticates the user or device using 802.1X port-based authentication. The authorization state (authorized or unauthorized) of controlled ports is controlled by the router based on authentication results from the authentication server. Before a user or device is authenticated, 802.1X access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic to pass through the Ethernet interface to which the user or device is connected. After authentication is successful, normal traffic can pass through the Ethernet interface. This mechanism improves network security by allowing only authorized users or devices to access the network.

Translation
Download
Updated: 2019-01-02

Document ID: EDOC1100055397

Views: 21540

Downloads: 39

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Share
Previous Next