Another deployment method, 802.1x, requires 802.1x systems to supply the health state before connecting. If you deploy using 802.1x enforcement, the key to a successful deployment is ensuring that all switches or access points are capable of 802.1x. The components include:
Supplicant: the client authenticating
Pass-through authenticator: RADIUS server
Authenticator: 802.1x access point
Using this method, the enforcement policy instructs an access point to limit a system to a restricted network. This can either be VLAN or IP packet filters. The process of client authentication is relatively straightforward and is shown in Figure 24-11.
Figure 24-11. The 802.1X process
Similar to the earlier ...