< Home

MAC Address Bypass Authentication

The combination of 802.1X authentication and its fallback mechanism MAC address authentication is called MAC address bypass authentication. With this feature, dumb terminals such as printers and fax machines can connect to the network through MAC address authentication. Figure 1 shows the MAC address bypass authentication process.

Authentication Process

Figure 1 MAC address bypass authentication process
  1. When an interface of the access device where MAC address bypass authentication is enabled receives a packet from the terminal, 802.1X authentication is first performed for the terminal.
  2. The access device sends an EAP-Request/Identity packet to request the user's client program to send the entered user name.
  3. If the access device does not receive any response packet within the retransmission interval, it resends EAP-Request/Identity packets until the configured retransmission count is reached.
  4. If all requests go unanswered, the access device sends an EAP Failure packet to the terminal.
  5. In this case, 802.1X authentication times out. The access device sends the user name and password to the RADIUS server for MAC address authentication.
  6. The RADIUS server compares the received user name and password with the locally saved user name and password. If they are the same, MAC address authentication succeeds and the RADIUS server sends a RADIUS Access-Accept packet to the device.
Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
Next topic >