13
Default
The access device performs EAP termination and uses CHAP to communicate with the RADIUS
server.
Views
System view
Predefined user roles
network-admin
Parameters
chap
: Configures the access device to perform Extensible Authentication Protocol (EAP)
termination and use the Challenge Handshake Authentication Protocol (CHAP) to communicate with
the RADIUS server.
eap
: Configures the access device to relay EAP packets, and supports any of the EAP
authentication methods to communicate with the RADIUS server.
pap
: Configures the access device to perform EAP termination and use the Password
Authentication Protocol (PAP) to communicate with the RADIUS server.
Usage guidelines
The access device terminates or relays EAP packets.
•
In EAP termination mode
—The access device re-encapsulates and sends the authentication
data from the client in standard RADIUS packets to the RADIUS server. The device performs
either CHAP or PAP authentication with the RADIUS server. In this mode, the RADIUS server
supports only MD5-Challenge EAP authentication and the username and password EAP
authentication initiated by an iNode client.
PAP transports usernames and passwords in plain text. The authentication method applies
to scenarios that do not require high security. To use PAP, the client can be an iNode 802.1X
client.
CHAP transports usernames in plain text and passwords in encrypted form over the
network. CHAP is more secure than PAP.
•
In EAP relay mode
—The access device relays EAP messages between the client and the
RADIUS server. The EAP relay mode supports multiple EAP authentication methods, such as
MD5-Challenge, EAP-TLS, and PEAP. To use this mode, make sure the RADIUS server meets
the following requirements:
Supports the EAP-Message and Message-Authenticator attributes.
Uses the same EAP authentication method as the client.
If this mode is used, the
user-name-format
command configured in RADIUS scheme view
does not take effect. For more information about the
user-name-format
command, see
"RADIUS commands."
If RADIUS authentication is used, you must configure the access device to use the same
authentication method (PAP, CHAP, or EAP) as the RADIUS server.
Examples
# Enable the access device to terminate EAP packets and perform PAP authentication with the
RADIUS server.
<Sysname> system-view
[Sysname] dot1x authentication-method pap
Related commands
display dot1x
Summary of Contents for SOHO IE4300
Page 285: ...i Contents Tcl commands 1 cli 1 tclquit 1 tclsh 2...
Page 288: ...i Contents Python commands 1 exit 1 python 1 python filename 2...
Page 291: ...i Contents Automatic configuration commands 1 autodeploy udisk enable 1...
Page 323: ...25 Sysname Ten GigabitEthernet1 0 51 undo shutdown Related commands irf port...
Page 465: ...ii stp vlan enable 55 vlan mapping modulo 55...
Page 602: ...12 Related commands display mvrp statistics...
Page 609: ...i Contents VLAN mapping commands 1 display vlan mapping 1 vlan mapping 2...
Page 678: ...9 Related commands reset pppoe relay statistics...
Page 846: ...i Contents Basic IP forwarding commands 1 display fib 1 ip forwarding table save 2...
Page 1770: ...i Contents Time range commands 1 display time range 1 time range 1...
Page 2026: ...34 Related commands display mac authentication...
Page 2028: ...ii...
Page 2143: ...i Contents User profile commands 1 display user profile 1 user profile 2...
Page 2308: ...61 ipsec transform set...
Page 2531: ...i Contents SAVI commands 1 ipv6 savi down delay 1 ipv6 savi log enable 1 ipv6 savi strict 2...
Page 2534: ...3 Sysname ipv6 savi strict Related commands ipv6 verify source...
Page 2791: ...14 Sysname track 1 Related commands delay display track...
Page 2939: ...9 sntp authentication keyid sntp reliable authentication keyid...
Page 2967: ...27 Related commands apply poe profile poe enable poe max power interface view poe priority...