
79
Configuring the Access Point
Configuring Ethernet Ports
■ If there are multiple devices connected to an AP port (through a downstream
switch), the port can be configured as either Port-based or MAC-based Authen-
ticator. In Port-based mode, only one of the attached MAC hosts must be
authorized for all hosts to be granted access to the network. In MAC-based mode,
each MAC host is individually authenticated.
■ If a Trunk Port is configured as a Supplicant, a user name and password must be
entered to authenticate the port to the 802.1X aware LAN switch.
■ If an Access Port is configured as an Authenticator, the administrator must define
the RADIUS server that the Authenticator will communicate with. All Ethernet ports
of a single AP are configured with the same RADIUS server.
Enable MAC authentication bypass: If MAC authentication bypass is enabled, the
port first attempts to authenticate the attached device by MAC address, and if that
fails, it will try to authenticate the device using 802.1X.
Komentarze do niniejszej Instrukcji