Deployment Scenarios

The authentication methods shown in Authentication Configuration are tailored toward user access at the edge of the network. Authentication is provided using EAP, and Extreme Network‘s multiauth feature allows for multiple supplicants per port.

Extreme Network‘s MACsec implementation is geared toward protecting Inter-Switch Links (ISLs) and dark fiber between two remote sites. Authentication is provided via Pre-Shared Keys rather than EAP, and only one supplicant is allowed per port. Although IEEE Standard 802.1X-2010 does allow for EAP authentication and for multiple supplicants per port using Group CAs and/or virtual ports, these features are not supported.