Port-Based Network Access Control
Figure 6 - 19 Example of Typical Port-Based Configuration
Once the connected device has been successfully authenticated, the Port then becomes Authorized, and all
subsequent traffic on the Port is not subject to access control restriction until an event occurs that causes the Port to
become Unauthorized. Hence, if there are more than one device connecting to a port (for example, these devices go
through a switch to access this port), and once one of the devices passes authenticating, then all other devices that is
connected to this port can access this port. Clearly, the security offered in this situation is open to attack.