Application Scenarios for 802.1x Authentication
To ensure security of the enterprise intranet, user access needs to be controlled, as shown in Figure 2-4. Only the users who are successfully authenticated can access authorized network resources.
A user terminal is a PC, on which the 802.1x client can be installed and used. The 802.1x authentication technology can be used. After the 802.1x client software is installed on the user terminal, the client can initiate an authentication application to the access device. After exchanging information with the user terminal, the access device sends user information to the authentication server for authentication. If the authentication is successful, the access device opens the interface connected to the user and allows the user to access the network. If the authentication fails, the access device forbids the user to access the network.