226 Configuring Switch Informationw w w . d e l l . c o m | s u p p o r t . d e l l . c o m • Enables user based authentication. Specific VLANs in the device are always available, even ifspecific ports attached to the VLAN are unauthorized.• For example, Voice over IP does not require authentication, while data traffic requiresauthentication. VLANs for which authorization is not required can be defined.Unauthenticated VLANs are available to users, even if the ports attached to the VLANare defined as authorized.Advanced Port Based Authentication is implemented in the following modes:• Single Host Mode — Only the authorized host can access the port.• Multiple Host Mode — Multiple hosts can be attached to a single port. Only one host mustbe authorized for all hosts to access the network. If the host authentication fails, or anEAPOL-logoff message is received, all attached clients are denied access to the network.• Guest VLANs — Provides limited network access authorized to ports. If a port is deniednetwork access via port based authorization, but the Guest VLAN is enabled, the port receiveslimited network access. For example, a network administrator can use Guest VLANs to denynetwork access via port based authentication, but grant Internet access to unauthorized users.