Thank you Nik, I value your info. I want gateway stuff. This is because my network
is isp and other types specific. EX would mean another empty switch right after the srx. This great but the authentication must be at the border gateway(srx300).
Topology=
isp(arris gateway)->srx300->wifi ap's->
media bridge-->engineering area(switches)->etc.
------------------------------
Adrian Aguinaga
B.S.C.M. I.T.T. Tech
(Construction Management)
A.A.S. I.T.T. Tech
(Drafting & Design)
------------------------------
Original Message:
Sent: 08-28-2025 10:15
From: Nikolay Semov
Subject: Deauthentication, reauthenticatio, authentication
That's stuff like this:
https://www.juniper.net/documentation/us/en/software/junos/user-access/topics/example/802-1x-pnac-single-supplicant-multiple-supplicant-configuring.html
You may have better luck in the EX community rather than SRX.
------------------------------
Nikolay Semov
Original Message:
Sent: 08-28-2025 04:15
From: eugene1973
Subject: Deauthentication, reauthenticatio, authentication
I'm referring to "basic" authentication. It is the way all networking authenticates other parts of the whole network. This includes applications and pc's etc. Dot1x, radius, etc. Deauthentication is necessary because if you authenticate a part of the network, it must have a way to undo this. I'm interested in realm authentication and the possibility of undoing thus. Deauthentication. But other examples are great too. Thx for your replies.
------------------------------
Adrian Aguinaga
B.S.C.M. I.T.T. Tech
(Construction Management)
A.A.S. I.T.T. Tech
(Drafting & Design)
Original Message:
Sent: 08-26-2025 10:32
From: JOHN WILLIAMSON
Subject: Deauthentication, reauthenticatio, authentication
Is this a follow-up post from another question? I haven't seen another question, so this post needs more info to be answered. What authentication process are you asking about? Local users? VPNs?
------------------------------
JOHN WILLIAMSON
Original Message:
Sent: 08-24-2025 20:24
From: eugene1973
Subject: Deauthentication, reauthenticatio, authentication
Reviving post!
------------------------------
Adrian Aguinaga
B.S.C.M. I.T.T. Tech
(Construction Management)
A.A.S. I.T.T. Tech
(Drafting & Design)
Original Message:
Sent: 08-09-2025 20:52
From: eugene1973
Subject: Deauthentication, reauthenticatio, authentication
Reviving post.
------------------------------
Adrian Aguinaga
B.S.C.M. I.T.T. Tech
(Construction Management)
A.A.S. I.T.T. Tech
(Drafting & Design)
Original Message:
Sent: 06-27-2025 22:25
From: eugene1973
Subject: Deauthentication, reauthenticatio, authentication
I'm wondering about the other parts of authentication. More specifically, deauthentication. I realize it must be an inherent part of authentication but I want to know if it is part of the command structure in the SRX series. Any and all commands can be discussed here. Maybe even parts where other commands might use this method. SYN is a part of this, but who knows exactly.
------------------------------
Adrian Aguinaga
B.S.C.M. I.T.T. Tech
(Construction Management)
A.A.S. I.T.T. Tech
(Drafting & Design)
------------------------------