A system administrator needs to implement 802.1x whereby when user logs into the network, the
authentication server communicates to the network switch and assigns the user to the proper VLAN.
Which of the following protocols should be used?
A.
RADIUS
B.
Kerberos
C.
LDAP
D.
MSCHAP
Following are three components to an 802.1X connection:
■ Supplicant: A software client running on a workstation. This is also known as
an authentication agent.
■ Authenticator: A wireless access point or switch.
■ Authentication server: An authentication database, most likely a RADIUS
server.
1
0