218
C
HAPTER
17: 802.1
X
C
ONFIGURATION
■
Upon receiving the key (encapsulated in an EAP-request/MD5 challenge
packet) from the switch, the client program encrypts the password of the
supplicant system with the key and sends the encrypted password (contained
in an EAP-response/MD5 challenge packet) to the RADIUS server through the
switch. (Normally, the encryption is irreversible.)
■
The RADIUS server compares the received encrypted password (contained in a
RADIUS access-request packet) with the locally-encrypted password. If the two
match, it will then send feedbacks (through a RADIUS access-accept packet
and an EAP-success packet) to the switch to indicate that the supplicant system
is authenticated.
■
The switch changes the state of the corresponding port to accepted state to
allow the supplicant system to access the network.
■
The supplicant system can also terminate the authenticated state by sending
EAPoL-Logoff packets to the switch. The switch then changes the port state
from accepted to rejected.
n
In EAP relay mode, packets are not modified during transmission. Therefore if one
of the four ways are used (that is, PEAP, EAP-TLS, EAP-TTLS or EAP-MD5) to
authenticate, ensure that the authenticating ways used on the supplicant system
and the RADIUS server are the same. However for the switch, you can simply
enable the EAP relay mode by using the
dot1x authentication-method eap
command.
EAP terminating mode
In this mode, EAP packet transmission is terminated at authenticator systems and
the EAP packets are converted to RADIUS packets. Authentication and accounting
are carried out through RADIUS protocol.
In this mode, PAP or CHAP is employed between the switch and the RADIUS
server. Figure 73 illustrates the authentication procedure (assuming that CHAP is
employed between the switch and the RADIUS server).
Summary of Contents for Switch 4210 9-Port
Page 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Page 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Page 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Page 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Page 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Page 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Page 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Page 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Page 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Page 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Page 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Page 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Page 340: ...338 CHAPTER 30 CLUSTER ...
Page 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Page 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Page 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Page 451: ......
Page 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Page 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Page 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...