Share your Knowledge
Wednesday, August 7, 2019
Extensible Authentication Protocol
›
802.1X uses the EAP to authenticate users who wish to access the network. EAP messages are exchanged between a supplicant and an authen...
MAC Authentication Bypass
›
When the MAB feature is enabled on an 802.1X port, the authenticator uses the MAC address as the client identity. The authentication se...
802.1X Phased Deployment Guidelines
›
802.1X can be implemented using a phased deployment model that allows for limited impact on network access while gradually introducing auth...
802.1X Closed Mode
›
The default behavior on a Cisco switch port configured for 802.1X is closed mode. With closed mode, no traffic allowed only EAPOL tr...
802.1X Low-Impact Mode
›
With low-impact mode, you are able to strengthen the security stance by adding an ingress ACL to the 802.1X-enabled switch port that is co...
802.1x monitor mode
›
The monitor mode allows for the deployment of the authentication methods 802.1X, MAB, or web authentication without any effect on user or ...
802.1X Phased Deployment
›
802.1X can be implemented using a phased deployment model that allows for limited impact on network access while gradually introducing authe...
›
Home
View web version