Introducing the solutions of the 'ST Series Products' for enhancing security levels!
"MAC address authentication" is an authentication method that determines whether to allow or deny communication based on the MAC address information uniquely assigned to individual hardware. The MAC address information of the client is registered as a username and password on the RADIUS server. When the client initiates communication, the authentication is completed between the authentication switch and the RADIUS server, allowing all devices that perform network communication to be subject to authentication. No special software is required for authentication. This feature is suitable for improving the security level of networks with access requests from a large number of unspecified clients. 【Supported Devices】 ■ST13528M ■ST13116M ■ST13512PW・ST13518PW *For more details, please refer to the PDF document or feel free to contact us.
Inquire About This Product
basic information
【Authentication Image via MAC Address Authentication (Unauthorized Access Blocking Operation)】 1. The device (network equipment) begins data transmission (the device connection port is in a blocked state). 2. ST13116M receives data from the device and generates a RADIUS access request frame using the source MAC address as the username and user password, then sends it to the RADIUS server. 3. The RADIUS server determines whether to deny or allow authentication based on user registration information. 4. Since the source MAC address is not registered, it replies with a RADIUS access denial frame. 5. Upon receiving the RADIUS access denial frame, the device connection port remains in a blocked state without being opened. *For more details, please refer to the PDF document or feel free to contact us.
Price range
Delivery Time
Applications/Examples of results
For more details, please download the PDF or feel free to contact us.
Company information
The ST series products are industrial Ethernet switch products that leverage our long-standing experience in network equipment development, providing the environmental resistance and high reliability required by social infrastructure systems. We also build networks tailored to customer applications, ranging from industrial network products, security (quarantine, user authentication), and VoIP systems to streaming data transmission such as video and images, regardless of whether the media is wired or wireless. Our company offers comprehensive support from network design and construction to after-sales service. Please feel free to contact us if you have any requests.

