MAC-Auth.-Bypass

This specifies whether a failed attempt to start an 802.1X negotiation should be followed by a check of the client’s MAC address via RADIUS and a subsequent opening of the port. In this case, the MAC address is transmitted as a RADIUS user name and password in the format "aabbccddeeff". It must also be stored in the RADIUS server in this format.

Important: The MAC address is easy to fake and does not protect against malicious attacks.
Note: In the standard configuration, the 802.1X authenticator will try to start an 802.1X negotiation for 90 seconds before falling back to the MAC address check. This time can be adjusted for each port by changing the parameters 2.30.4.5 Max-Req (default: 3 attempts) and 2.30.4.7 Supp-Timeout (default: 30 seconds). Alternatively, the mode for MAC Auth Bypass can be set to "Immediate". This mode immediately starts a MAC address check without waiting for a timeout.
SNMP ID:
2.4.10.3.5 
Console path:
Setup > LAN > IEEE802.1X > Authenticator-Ifc-Setup
Possible values:
No
MAC address authentication is not possible.
Yes
MAC address authentication is possible.
Immediate
Authentication is immediately performed by MAC address.
Default:
No

www.lancom-systems.com

LANCOM Systems GmbH | A Rohde & Schwarz Company | Adenauerstr. 20/B2 | 52146 Wuerselen | Germany | E‑Mail info@lancom.de

LANCOM Logo