Hi,

Yes, this is our actual configuration and it works very well, but I think that 
with the long run, a
database that contains all MAC address can become very difficult to manage.
But if it' s the only solution, I will make with.

Thanks.



                                                                       
  Nicolas CLO                                                          
  Industrial and Network Technician                                    
  ITS Section                                                          
                                                                       









  -----------------------------------------------Original
  mail------------------------------------------------------






Hi,

>    I'm now sure that the best way for us is MAC Address filtering.

thats a way of doing the 'host' part. the user can then be authenticated
by an EAP method.

ie authorization stage can check the calling-station-id (MAC address) and,
if not known, just reject. then, if known carry on to the user authentication
by 802.1X

as already said, you have to know what you want and the technologies available

alan
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

<<inline: ecblank.gif>>

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to