Username/Host authorization
nicolas.clo at ricoh-industrie.fr
nicolas.clo at ricoh-industrie.fr
Tue Jun 25 08:11:41 CEST 2013
Hi,
Yes, this is our actual configuration and it works very well, but I think that with the long run, a
database that contains all MAC address can become very difficult to manage.
But if it' s the only solution, I will make with.
Thanks.
Nicolas CLO
Industrial and Network Technician
ITS Section
-----------------------------------------------Original
mail------------------------------------------------------
Hi,
> I'm now sure that the best way for us is MAC Address filtering.
thats a way of doing the 'host' part. the user can then be authenticated
by an EAP method.
ie authorization stage can check the calling-station-id (MAC address) and,
if not known, just reject. then, if known carry on to the user authentication
by 802.1X
as already said, you have to know what you want and the technologies available
alan
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20130625/2ab339d5/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: ecblank.gif
Type: image/gif
Size: 45 bytes
Desc: not available
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20130625/2ab339d5/attachment.gif>
More information about the Freeradius-Users
mailing list