< Home

AS Access User Authentication Configuration

If access users do not need to be authenticated, skip this section.

In an SVF system shown in Figure 1, the parent functions as the access control authentication point of all users, and so services of the authentication server only need to be configured on the parent once, simplifying deployment. The access control enforcement points of all users are deployed on ASs. To ensure security, users who fail authentication cannot access ASs.

Figure 1 Access control authentication point and enforcement points

An SVF system supports three access user authentication modes: MAC, 802.1X, and Portal. Table 1 lists the characteristics and application scenarios of the three authentication modes.

Table 1 Characteristics and application scenarios of authentication modes

Authentication Mode

Characteristics

Applicable Scenario

MAC

  • No client software needs to be installed.
  • Users do not need to enter user names and passwords when logging in to the network.
  • MAC addresses of all users need to be configured, complicating the configurations.

Dumb terminals, such as printers and fax machines, need to connect to the network.

802.1X

  • The 802.1X client software needs to be installed.
  • Easy-to-remember user names can be configured.
  • Users need to enter user names and passwords when logging in to the network.

The network is newly built, users are densely distributed, and high information security is required.

Portal

  • No client software needs to be installed.
  • Easy-to-remember user names can be configured.
  • Users need to enter user names and passwords when logging in to the network.

Users are sparsely distributed or move freely.

An SVF system supports only one combination of authentication modes. The combination can contain one or more of MAC, 802.1X, and Portal authentication modes according to scenario requirements.

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >