XGS-5240-Series User Manual

Table Of Contents
Configuration Guide of XGS-5240-Series
47-12
Fig 3-12 the Authentication Flow of 802.1x EAP Termination Mode
47.1.6 The Extension and Optimization of 802.1x
Besides supporting the port- based access authentication method specified by the p
rotocol, devices also extend and optimize it when implementing the EAP relay mode an
d EAP termination mode of 802.1x.
Supports some applications in the case of which one physical port can have more
than one users
There are three access control methods (the methods to authenticate users): port-b
ased, MAC-based and user-based (IP address+ MAC address+ port).
When the port-based method is used, as long as the first user of this port pa
sses the authentication, all the other users can access the network resources
without being authenticated. However, once the first user is offline, the network
won’t be available to all the other users.
When the MAC-based method is used, all the users accessing a port should
be authenticated separately, only those pass the authentication can access the