- Written by Rahul Sharma
- Posted on January 12, 2026
- Updated on January 12, 2026
- 14 Views
This feature allows a user to adjust the MTU of radius requests for 802.1x supplicants. Currently this feature only adjusts the MTU size of radius requests for supplicants undergoing EAP TLS authentication. This can be useful in scenarios where hops between the switch and RADIUS doesn’t support IP MTU discovery and the switch ends up sending Access Requests based on the interface MTU size which get dropped at such hops. With this feature, a user has the flexibility to experiment and choose a MTU setting that works for such a topology forcing the Dot1x agent to send the Access Requests with the configured MTU.
- Written by Yongguang Xu
- Posted on February 17, 2021
- Updated on July 10, 2024
- 10711 Views
The Dot1x Dropped Counters count the packets that get dropped for dot1x interfaces. The following
- Written by Brett Hatch
- Posted on April 30, 2025
- Updated on April 30, 2025
- 2698 Views
This feature provides an IPv6 address provisioning mechanism which is driven by tenant authentication results and offers inter-tenant traffic isolation. The generated IPv6 connected route subnets can also be summarized into aggregate routes dynamically for advertising out to BGP peers.
- Written by Harshit Jain
- Posted on January 11, 2022
- Updated on January 11, 2022
- 12126 Views
RADIUS protocol specifies the existence of Dynamic Authorization messages which provides a mechanism to change the
- Written by Prakhar Rastogi
- Posted on September 2, 2021
- Updated on January 10, 2023
- 12140 Views
RADIUS over TLS provides secure and reliable transport for RADIUS clients. RADIUS over TLS allows RADIUS
- Written by Yagna Siriki
- Posted on August 24, 2020
- Updated on August 24, 2020
- 10947 Views
Some devices connected to Dot1x port in trunk phone mode won’t start authentication until it is awakened with a
