JN0-649 Exam QuestionsBrowse all questions from this exam

JN0-649 Exam - Question 56


You are deploying an 802.1X solution and must determine what would happen if clients are unable to re-authenticate to the RADIUS server.

In this scenario, which configuration would provide access to the network if the supplicant is already authenticated?

Show Answer
Correct Answer: D

If clients are unable to re-authenticate to the RADIUS server, the 'sustain' configuration allows already authenticated supplicants to maintain their network access while blocking new, unauthenticated devices. This ensures that there is no disruption for users who are already validated, providing continuous access to the network under these conditions.

Discussion

7 comments
Sign in to comment
WallseeOption: D
Dec 17, 2022

should be D

dragosskyOption: D
Jan 4, 2023

Permit authentication, allowing traffic to flow from the end device through the interface as if the end device were successfully authenticated by the RADIUS server. Deny authentication, preventing traffic from flowing from the end device through the interface. This is the default. Move the end device to a specified VLAN. (The VLAN must already exist on the router.) Sustain authenticated end devices that already have LAN access and deny unauthenticated end devices. If the RADIUS servers time out during reauthentication, previously authenticated end devices are reauthenticated and new users are denied LAN access.

sanalainenOption: B
Mar 16, 2023

If the RADIUS authentication servers become unavailable or inaccessible the server fail fallback is triggered. By default, the deny option is configured under server-fail, which force fails the supplicant authentication. However, there are other options that you can configure as actions to be taken for end devices awaiting authentication when the server times out. server-fail (bridge-domain bridge-domain | deny | permit | use-cache | vlan-name vlan-name) - deny—Force the supplicant authentication to fail. No traffic will flow through the interface. - permit—Force the supplicant authentication to succeed. Traffic will flow through the interface as if it were successfully authenticated by the RADIUS server. - use-cache—Force the supplicant authentication to succeed only if it was previously authenticated successfully. This action ensures that already authenticated supplicants are not affected.

piipoOption: D
Jun 22, 2023

D Sustain

harrypogiOption: D
Sep 22, 2023

D is correct

yh511Option: D
Nov 23, 2023

https://www.juniper.net/documentation/us/en/software/junos/user-access/topics/concept/802-1x-pnac-divert-authentication-understanding-mx-series.html

ARSE_TOPOption: D
Jun 14, 2024

D is correct, Sustain. "Server fail fallback allows you to specify one of four actions to be taken toward end devices awaiting authentication when the server is timed out: Permit: authentication, allowing traffic to flow from the end device through the interface as if the end device were successfully authenticated by the RADIUS server. Deny: authentication, preventing traffic from flowing from the end device through the interface. This is the default. Move: the end device to a specified VLAN. (The VLAN must already exist on the router.) Sustain: authenticated end devices that already have LAN access and deny unauthenticated end devices. If the RADIUS servers time out during reauthentication, previously authenticated end devices are reauthenticated and new users are denied LAN access. https://www.juniper.net/documentation/us/en/software/junos/user-access/topics/concept/802-1x-pnac-divert-authentication-understanding-mx-series.html