
Appendix C --- IEEE 802.1x protocol over IP DSLAM
Understanding How 802.1X Authentication Works
IEEE 802.1X is a
802.1X controls network access by creating two distinct virtual access points at each port (See Above Figure). One access point is an uncontrolled port; the other is a controlled port. All traffic through the single port is available to both access points. Only EAPOL traffic is allowed to pass through the uncontrolled port, which is always open. The controlled port is open only when the device that is connected to the port has been authorized by 802.1X. After this authorization takes place, the controlled port opens, allowing normal traffic to pass.
700 | IDL series User Guide |
|
|