OK, so how do we validate, right? So we’ve connected a couple of clients to the switch. One is a laptop that’s doing dot 1x using certificate.
Another one is the Phillips Hue app. That doesn’t do any dot 1x, and just doing Mac authentication. So we could see those two clients are connected.
Let’s take a look at the laptop one. So we could click on the port. We see that there is a client with a username flashing up.
Let’s take a look at the wired client insights. And what we can see here is that the user has been authenticated. You could see the port up and down events from the switch side. We see all the authentication phases, same as we saw in the wireless side.
The client trusts the server. The server trusts the client certificate. We get all the metadata here.
We then are saying client access is allowed. And voila. We matched the same authentication policy rule. Great.
So now, we know that this part is working. Now, we go to switch back. And let’s look at the Philips device.
That device is not doing any form of dot 1x authentication. So let’s just take a look at the wired client insights. Yeah, and we are seeing that here the user is authenticated. And there is a client access allowed event here as well.
And in this case, the authentication type is Mac address bypass– the Mac address that we’ve added to the client list. And voila. We are matching th