In this paper, the working mechanism of the 802.1x protocol as well as its architecture is analyzed. By comparing this protocol with the prevail authentication, the authors present a conception of the protocol application in the broadband access networks.