Dell PowerConnect 5448 User's Guide - Page 242
Single Host Mode, Multiple Host Mode, Guest VLANs, device are always available
View all Dell PowerConnect 5448 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 242 highlights
MAC Based Authentication MAC based authentication is an alternative to 802.1x that allows allows network access to devices (such as printers and IP phones) that do not have the 802.1X supplicant capability. MAC authentication uses the MAC address of the connecting device to grant or deny network access. Advanced Port Based Authentication Advanced Port Based Authentication enables multiple hosts to be attached to a single port. Advanced Port Based Authentication requires only one host to be authorized for all hosts to have system access. If the port is unauthorized all attached hosts are denied access to the network. Advanced Port Based Authentication also enables user based authentication. Specific VLANs in the device are always available, even if specific ports attached to the VLAN are unauthorized. For example, Voice over IP does not require authentication, while data traffic requires authentication. VLANs for which authorization is not required can be defined. Unauthenticated VLANs are available to users, even if the ports attached to the VLAN are defined as authorized. Advanced Port Based Authentication is implemented in the following modes: • Single Host Mode - Enables only the authorized host for single-session access to the port. • Multiple Host Mode - Enables multiple hosts to be attached to a single port, for single-session access. Only one host must be authorized for all hosts to access the network. If the host authentication fails or an EAPOL-logoff message is received, all attached clients are denied network access. • Multiple Session Mode - Enables only the authorized host for multiple-session access to the port. • Guest VLANs - Provides limited network access to unauthorized ports. If a port is denied network access via port-based authorization, but the Guest VLAN is enabled, the port receives limited network access. For example, a network administrator can use Guest VLANs to deny network access via port-based authentication, but grant Internet access to unauthorized users. 242 Configuring Device Information