EasyManuals Logo

QTech QSW-2800 series User Manual

QTech QSW-2800 series
415 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #304 background imageLoading...
Page #304 background image
+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1
290
In EAP termination mode, the access control unit and the RADIUS server can use PAP or
CHAP authentication method. The following figure will demonstrate the basic operation flow
using CHAP authentication method.
The Authentication Flow of 802.1x EAP Termination Mode
38.1.5 The Extension and Optimization of 802.1x
Besides supporting the port- based access authentication method specified by the protocol,
devices also extend and optimize it when implementing the EAP relay mode and EAP
termination mode of 802.1x.
Supports some applications in the case of which one physical port can have more than one
users
There are three access control methods (the methods to authenticate users): port-based,
MAC-based and user-based (IP address+ MAC address+ port).
When the port-based method is used, as long as the first user of this port passes the
authentication, all the other users can access the network resources without being
authenticated. However, once the first user is offline, the network won’t be available to all the
other users.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the QTech QSW-2800 series and is the answer not in the manual?

QTech QSW-2800 series Specifications

General IconGeneral
BrandQTech
ModelQSW-2800 series
CategorySwitch
LanguageEnglish

Related product manuals