Hi,
Yes, this is our actual configuration and it works very well, but I think that
with the long run, a
database that contains all MAC address can become very difficult to manage.
But if it' s the only solution, I will make with.
Thanks.
Nicolas CLO
Industrial and Network Technician
ITS Section
-----------------------------------------------Original
mail------------------------------------------------------
Hi,
> I'm now sure that the best way for us is MAC Address filtering.
thats a way of doing the 'host' part. the user can then be authenticated
by an EAP method.
ie authorization stage can check the calling-station-id (MAC address) and,
if not known, just reject. then, if known carry on to the user authentication
by 802.1X
as already said, you have to know what you want and the technologies available
alan
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
<<inline: ecblank.gif>>
- List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

