Figure 1 shows the processing logic of the access device during 802.1X authentication. RADIUS authentication is used as an example.
Wireless 802.1X users only support the authorization configurations of retaining network access rights when the authentication server goes Down and retaining network access rights when the authentication server does not respond.