Access Control Concepts

Network Access Control Technologies

6.The authentication server returns an accept or deny response to the PEP, based on the results of step 5.

7.The PEP keeps the port shut or opens the port to all traffic depending on the access decision.

If the accept response included authorization instructions, the PEP con- figures itself to enforce them—for example, assigning the user’s port to the specified VLAN.

You can optionally configure some PEPs to open the port to rejected users but assign those users to a VLAN with limited access to the network (the unauthorized VLAN).

Figure 1-4. The 802.1X Process

1-22

Page 36
Image 36
HP Access Control Client Software manual 802.1X Process