Clients may be required to authenticate themselves using other methods depending on the network privileges required. For example, if clients are allowed access to the network via station A, then one method of authenticating station A is MAC-based. MAC-based authentication is often used to authenticate and allow network access through certain devices while denying access to the rest. ![]() While not the most secure and scalable method, MAC-based authentication implicitly provides an addition layer of security authentication devices. Use MAC-based authentication to authenticate devices based on their physical media access control (MAC) address. ![]() This chapter describes how to configure MAC-based authentication on the Arubacontrollerusing the WebUI.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |