Username/Host authorization

nicolas.clo at nicolas.clo at
Tue Jun 25 08:11:41 CEST 2013


Yes, this is our actual configuration and it works very well, but I think that with the long run, a
database that contains all MAC address can become very difficult to manage.
But if it' s the only solution, I will make with.


  Nicolas CLO                                                          
  Industrial and Network Technician                                    
  ITS Section                                                          




>    I'm now sure that the best way for us is MAC Address filtering.

thats a way of doing the 'host' part. the user can then be authenticated
by an EAP method.

ie authorization stage can check the calling-station-id (MAC address) and,
if not known, just reject. then, if known carry on to the user authentication
by 802.1X

as already said, you have to know what you want and the technologies available

List info/subscribe/unsubscribe? See
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: ecblank.gif
Type: image/gif
Size: 45 bytes
Desc: not available
URL: <>

More information about the Freeradius-Users mailing list