Ruijie Community

Title: How does the system implement user isolation and locating after user authentication? [Print this page]

Author: admin    Time: 2017-5-3 17:21
Title: How does the system implement user isolation and locating after user authentication?
How does the system implement user isolation and locating after user authentication?

Author: admin    Time: 2017-5-3 17:21
Currently, the simplified campus network supports two deployment modes: access isolation and QinQ.

User isolation: Each access device is in a VLAN. Protected interfaces are enabled between ports to achieve isolation. For the QinQ mode, the ports of the access device belongs to different VLANs to achieve isolation.

locating: Currently, the locating tool is used for information locating. After a user accesses to the access device, the access device transmits the MAC address, port number, VLAN information, and device information of the user to the locating tool through the SNMP. After the user is authenticated, the SAM server synchronizes the user information to the locating tool. According to the information, the locating tool can locate the user. In addition, the locating tool can save the history login records of the user to rapidly identify any account hacking.






Welcome to Ruijie Community (https://community.ruijienetworks.com/) Powered by Discuz! X3.2