
2-5
the packet is for querying the identity of the client. A value of 4 represents MD5-Challenge, which
corresponds closely to the PPP CHAP protocol.
Figure 2-5
Format of the Data field in an EAP request/response packet
z
Identifier: Allows matching of responses with requests.
z
Length: Length of the EAP packet, including the Code, Identifier, Length, and Data fields, in bytes.
z
Data: Content of the EAP packet. This field is zero or more bytes and its format is determined by
the Code field.
EAP over RADIUS
Two attributes of RADIUS are intended for supporting EAP authentication: EAP-Message and
Message-Authenticator. For information about RADIUS packet format, refer to
AAA Configuration
in
the
Security Volume
.
EAP-Message
The EAP-Message attribute is used to encapsulate EAP packets.
Figure 2-6
shows its encapsulation
format. The value of the Type field is 79. The String field can be up to 253 bytes. If the EAP packet is
longer than 253 bytes, it can be fragmented and encapsulated into multiple EAP-Message attributes.
Figure 2-6
Encapsulation format of the EAP-Message attribute
Message-Authenticator
Figure 2-7
shows the encapsulation format of the Message-Authenticator attribute. The
Message-Authenticator attribute is used to prevent access requests from being snooped during EAP
authentication. It must be included in any packet with the EAP-Message attribute; otherwise, the
packet will be considered invalid and get discarded.
Figure 2-7
Encapsulation format of the Message-Authenticator attribute
802.1X Authentication Triggering
802.1X authentication can be initiated by either a client or the device.
Summary of Contents for 4210G Series
Page 459: ...4 8...
Page 493: ...12 1...
Page 968: ...19 6 000f e235 dc71 1 Config static GigabitEthernet 1 0 1 NOAGED 1 mac address es found...