Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

Configuring Static MAC Bypass of Authentication on MX Series Routers in Enhanced LAN Mode

date_range 30-Nov-23

Starting with Junos OS Release 14.2, you can configure a static MAC bypass list (sometimes called the exclusion list) on the switch to specify MAC addresses of devices allowed access to the LAN without 802.1X or MAC RADIUS authentication requests to the RADIUS server.

To configure the static MAC bypass list:

  • Specify a MAC address to bypass authentication:

    content_copy zoom_out_map
    [edit protocols authentication-access-control]
    user@router# set static 00:04:0f:fd:ac:fe
  • Configure a supplicant to bypass authentication if connected through a particular interface:

    content_copy zoom_out_map
    [edit protocols authentication-access-control]
    user@router# set static 00:04:0f:fd:ac:fe interface ge-0/0/5
    
  • You can configure a supplicant to be moved to a specific VLAN after it is authenticated:

    content_copy zoom_out_map
    [edit protocols authentication-access-control]
    user@router# set static 00:04:0f:fd:ac:fe interface ge-0/0/5 vlan-assignment default-vlan

Change History Table

Feature support is determined by the platform and release you are using. Use Feature Explorer to determine if a feature is supported on your platform.

Release
Description
14.2
Starting with Junos OS Release 14.2, you can configure a static MAC bypass list (sometimes called the exclusion list) on the switch to specify MAC addresses of devices allowed access to the LAN without 802.1X or MAC RADIUS authentication requests to the RADIUS server.
footer-navigation