IEEE 802.1X authentication allows only authorized users or devices to access a network, which improves network security.
802.1X port-based authentication allows only authorized users to access the network, improving network security.
The 802.1X protocol is an important concept of 802.1X port-based authentication. Before granting access to services, IEEE 802.1X authenticates users or devices attached to controlled ports on the router. The access to controlled ports is allowed or denied as determined by the authorization state of controlled ports. Controlled ports in the unauthorized state will deny the user or device access. Before a user or device functioning as the supplicant PAE gains access to various network services, the authenticator PAE authenticates the user or device using 802.1X port-based authentication. The authorization state (authorized or unauthorized) of controlled ports is controlled by the router based on authentication results from the authentication server. Before a user or device is authenticated, 802.1X access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic to pass through the Ethernet interface to which the user or device is connected. After authentication is successful, normal traffic can pass through the Ethernet interface. This mechanism improves network security by allowing only authorized users or devices to access the network.
802.1x port authentication applies to scenarios where no BAS interface is configured. The "users" mentioned in 802.1x port authentication configuration refer to network-side users, but not BAS users.