802.1X Access Control Protocols: Exam 400-351 | Cisco CCIE Wireless

IEEE 802.1X Access Control Protocols

Question

Which three protocols does IEEE 802.1X access control allow until the client is authenticated? (Choose three.)

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D. E.

ACD.

IEEE 802.1X is a protocol used for port-based network access control. It provides a mechanism for authenticating devices that want to connect to a network, such as wireless clients, before allowing them access to network resources.

The three protocols that IEEE 802.1X access control allows until the client is authenticated are:

  1. Extensible Authentication Protocol over LAN (EAPOL) EAPOL is a protocol used for transporting EAP (Extensible Authentication Protocol) frames between the client and the authentication server. It provides a secure communication channel for the exchange of authentication messages between the client and the authentication server.

  2. Cisco Discovery Protocol (CDP) CDP is a proprietary protocol used by Cisco devices to share information about other directly connected Cisco equipment, such as device type and capabilities, IP addresses, and IOS version.

  3. VLAN Trunking Protocol (VTP) VTP is a protocol used by Cisco switches to synchronize VLAN information within a domain. It enables a network administrator to configure VLANs on one switch and have those configurations automatically propagated to other switches in the domain.

Spanning Tree Protocol (STP) and Dynamic Host Control Protocol (DHCP) are not protocols allowed until the client is authenticated by IEEE 802.1X access control. STP is a protocol used to prevent loops in a network, and DHCP is a protocol used to dynamically assign IP addresses to devices on a network.

In summary, IEEE 802.1X access control allows EAPOL, CDP, and VTP until the client is authenticated, while STP and DHCP are not allowed until authentication is completed.