What is one difference between captive portal authentication and 802.1 X authentication?

What is one difference between captive portal authentication and 802.1 X authentication?
A. 802.1 X authentication always authenticates the wireless client, while captive portal authentication always authenticates the wireless user.
B. 802.1 X authentication occurs at Layer 2, while captive portal authentication occurs at Layer 3.
C. 802.1 X authentication must use an LDAP server, while captive portal authentication can use a RADIUS server or an LDAP server.
D. 802.1 X authentication is typically implemented without encryption, while captive authentication is often combined with WPA or WPA2.

Download Printable PDF. VALID exam to help you PASS.

10 thoughts on “What is one difference between captive portal authentication and 802.1 X authentication?

  1. Correct is B

    From Training Material:
    “Authentication Methods Review
    L2 Autentication:
    Hidden SSID
    MAC
    WPA PSK
    802.1x Methods

    L3 Authentication:
    Captive portal
    VPN

  2. I don’t think so.
    In both cases users are authenticated (WPA-2Enterprise and Captive Portal with authentication).
    In my organization we have a WPA2-Enterprise network and another network with Captive Portal and the users/devices are in the same VLAN, the difference is that the users of the Captive Portal when they connect already have IP and resolve DNS to reach the portal, and users who connect to the enterprise network need to authenticate with their credentials against LDAP, then they get IP.

  3. I think it’s the B.

    Captive portal needs L3 so that the device has IP and can resolve DNS to reach the portal.
    802.1X is authenticated to L2 and then gets IP.

    2
    1
    1. A. is a true statement, and seems like something Aruba would be looking for. You could put the Captive portal on the same VLAN that the client is trying to authenticate and then it would be only using layer 2 to communicate.

      1. I don’t think so.
        In both cases users are authenticated (WPA-2Enterprise and Captive Portal with authentication).
        In my organization we have a WPA2-Enterprise network and another network with Captive Portal and the users/devices are in the same VLAN, the difference is that the users of the Captive Portal when they connect already have IP and resolve DNS to reach the portal, and users who connect to the enterprise network need to authenticate with their credentials against LDAP, then they get IP.

        1. CM is correct in describing the captive portal and .1x difference in enterprise environment.
          i believe B is the answer.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.