O'Reilly logo

Windows Server® 2008 Administrator’s Companion by Charlie Russel and Sharon Crawford

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

IEEE 802.1x Enforcement in NAP

Another deployment method, 802.1x, requires 802.1x systems to supply the health state before connecting. If you deploy using 802.1x enforcement, the key to a successful deployment is ensuring that all switches or access points are capable of 802.1x. The components include:

  • Supplicant: the client authenticating

  • Pass-through authenticator: RADIUS server

  • Authenticator: 802.1x access point

Using this method, the enforcement policy instructs an access point to limit a system to a restricted network. This can either be VLAN or IP packet filters. The process of client authentication is relatively straightforward and is shown in Figure 24-11.

Figure 24-11. The 802.1X process

Configuring IEEE 802xz Enforcement

Similar to the earlier ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required