As shown in Figure 1, users' network access needs to be controlled to ensure network security. Only authenticated users are allowed to access network resources authorized by the administrator.
802.1X authentication results in the change of the interface state, but does not involve IP address negotiation or assignment. 802.1X authentication is the simplest authentication solution. However, the 802.1X client software must be installed on the user terminal.