What is one difference between captive portal authentication and 802.1 X authentication?
A. 802.1 X authentication always authenticates the wireless client, while captive portal authentication always authenticates the wireless user.
B. 802.1 X authentication occurs at Layer 2, while captive portal authentication occurs at Layer 3.
C. 802.1 X authentication must use an LDAP server, while captive portal authentication can use a RADIUS server or an LDAP server.
D. 802.1 X authentication is typically implemented without encryption, while captive authentication is often combined with WPA or WPA2.
B should be right
A
Correct Answer: B
Correct is B
From Training Material:
“Authentication Methods Review
L2 Autentication:
Hidden SSID
MAC
WPA PSK
802.1x Methods
L3 Authentication:
Captive portal
VPN
I don’t think so.
In both cases users are authenticated (WPA-2Enterprise and Captive Portal with authentication).
In my organization we have a WPA2-Enterprise network and another network with Captive Portal and the users/devices are in the same VLAN, the difference is that the users of the Captive Portal when they connect already have IP and resolve DNS to reach the portal, and users who connect to the enterprise network need to authenticate with their credentials against LDAP, then they get IP.
I think it’s the B.
Captive portal needs L3 so that the device has IP and can resolve DNS to reach the portal.
802.1X is authenticated to L2 and then gets IP.
A. is a true statement, and seems like something Aruba would be looking for. You could put the Captive portal on the same VLAN that the client is trying to authenticate and then it would be only using layer 2 to communicate.
I don’t think so.
In both cases users are authenticated (WPA-2Enterprise and Captive Portal with authentication).
In my organization we have a WPA2-Enterprise network and another network with Captive Portal and the users/devices are in the same VLAN, the difference is that the users of the Captive Portal when they connect already have IP and resolve DNS to reach the portal, and users who connect to the enterprise network need to authenticate with their credentials against LDAP, then they get IP.
CM is correct in describing the captive portal and .1x difference in enterprise environment.
i believe B is the answer.
Why not B?