A short update after some lab testing and a customer project with using wired port authentication on AP3912i:
- solo MAC or 802.1X authentication on wired ports is working via configuration of a WLAN service (I had EWC, XMC and Control running)
- MAC bypass (no fallback!) in combination with 802.1X is working as well
- Multi user authentication on wired ports is working but I don´t know how many devices are possible behind a single port
But, there are some important things to remember:
- never use a session timeout in the WLAN service for wired ports other than 0 (this makes you and the customer very unhappy - I don´t know why...)
- Using MUA on a wired port (f.e. with ip-Phone and PC) you have to remember that both devices are in the same SSID(VLAN) but with different IPs (MAC-upstreamVLAN(and IP) matching via authenticated role). Think that the switch is working like a WIFI network.
- I could not use MAC authentication as a fallback mechanism. If the client aswer the EAPOL request and get´s a reject from RADIUS(NAC), this client cannot authenticate via MAC. I don´t know if this is FAD or a bug.
- NO troubleshooting for wired ports, no port up/down view, no logs.... NOTHING !!!!
So this is a good product, but bad implementation for wired ports. It´s a pitty!
I have no Idea how this will work if you use the 3912i as an IOT-Defender ....
br
Volker