What is Authentication

4

The function of confirming the identity of a person or software program.

Other related questions:
What is centralized authentication
An AC controls access of wireless users in centralized manner, reducing occupied bandwidth between APs and the upstream device.

What is the relationship between OSPF interface authentication and area authentication
The basic principles of OSPF authentication are as follows: If authentication is configured on the interface, use the authentication on the interface. If null is configured on the interface, no authentication is performed on the interface. If no authentication is performed on the interface (Null does not mean that no authentication is configured), the authentication configured on the area is used. If no authentication is configured on the area, either, no authentication will be performed.

What are the requirements on the browser for portal authentication
Internet Explorers are recommended. If users and MAC addresses are bound on the FW, the Internet Explorer must be used, and ActiveX must be enabled. Otherwise, user MAC addresses cannot be obtained.

What are advantages and disadvantages of WAPI authentication
WLAN authentication and Privacy Infrastructure (WAPI) has three independent elements: STA, AP, and Authentication Service Unit (ASU), to ensure authentication security. Encryption keys are generated after negotiation. WAPI authentication uses the SMS4 algorithm and supports 802.1X authentication applying to a large-scale network. WAPI applies to scenarios requiring high security level. In WAPI authentication, the ASU server must check certificates, which requires support from STAs. Currently, a few STAs support WAPI. STA hardware needs to be upgraded to support WAPI. Software application is not widely used because of its low efficiency.

Differences between port authentication and MAC address authentication on S series switches
The 802.1x protocol is a port-based network access control protocol that authenticates access users on ports of an access control device to control access to network resources. As a result, 802.1x authentication is also called port authentication. MAC address authentication controls a user's network access rights based on the access port and the user's MAC address. After MAC address authentication is enabled on a port, the device starts authentication for a user when it detects the MAC address of the user on the port. For S series switches (except the S1700), differences between port authentication and MAC address authentication are as follows: - Port authentication requires secure 802.1x client software, but MAC address authentication does not require any client software. - Port authentication requires a user to enter the user name and password in the 802.1x client, but MAC address authentication does not require the user to enter the user name or password. - MAC address authentication is mainly used for access authentication of dumb terminals where clients cannot be installed, such as printers and scanners.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top