Operation Manual – 802.1x
Quidway S3100 Series Ethernet Switches
Chapter 1 802.1x Configuration
Huawei Technologies Proprietary
1-3
z
Port-based authentication. When a port is controlled in this way, all the supplicant
systems connected to the port can access the network without being
authenticated after one supplicant system among them passes the authentication.
And when the authenticated supplicant system goes offline, the others are denied
as well.
z
MAC address-based authentication. All supplicant systems connected to a port
have to be authenticated individually in order to access the network. And when a
supplicant system goes offline, the others are not affected.
1.1.2 The Mechanism of an 802.1x Authentication System
IEEE 802.1x authentication system uses extensible authentication protocol (EAP) to
exchange information between the supplicant system and the authentication server.
Supplicant system
PAE
Authenticator
System PAE
EAPoL
EAP/PAP/CHAP exchanges
carried by RADIUS protocol
Supplicant system
PAE
Authenticator
System PAE
Authentication server
EAP/PAP/CHAP exchanges
carried by RADIUS protocol
Supplicant system
PAE
Authenticator
System PAE
Authentication server
EAPoL
EAP/PAP/CHAP exchanges
carried by RADIUS protocol
Supplicant system
PAE
Authenticator
System PAE
Authentication server
Authentication server
EAP/PAP/CHAP exchanges
carried by RADIUS protocol
Figure 1-2
The mechanism of an 802.1x authentication system
z
EAP protocol packets transmitted between the supplicant system and the
authenticator system are encapsulated as EAPoL packets.
z
EAP protocol packets transmitted between the supplicant system PAE and the
RADIUS server can either be encapsulated as EAPoR (EAP over RADIUS)
packets or be terminated at system PAEs (The system PAEs then communicate
with RADIUS servers through PAP (password authentication protocol) or CHAP
(challenge-handshake authentication protocol) protocol packets.)
z
When a supplicant system passes the authentication, the authentication server
passes the information about the supplicant system to the authenticator system.
The authenticator system in turn determines the state (authorized or unauthorized)
of the controlled port according to the instructions (accept or reject) received from
the RADIUS server.
1.1.3 Encapsulation of EAPoL Messages
I. The format of an EAPoL packet
EAPoL is a packet encapsulation format defined in 802.1x. To enable EAP protocol
packets to be transmitted between supplicant systems and authenticator systems
through LANs, EAP protocol packets are encapsulated in EAPoL format. The following
figure illustrates the structure of an EAPoL packet.
PAE Ethernet type
Protocol version
Length
0
2
3
4
Packet body
6
N
Type
PAE Ethernet type
Protocol version
Length
0
2
3
4
Packet body
6
N
Type
Figure 1-3
The format of an EAPoL packet