User Manual
125
The Fig. 3-55 shows the procedure of 802.1X authentication. There are steps
for the login based on 802.1X port access control management. The protocol used
in the right side is EAPOL and the left side is EAP.
1.
At the initial stage, the supplicant A is unauthenticated and a port
on switch acting as an authenticator is in unauthorized state. So the
access is blocked in this stage.
2.
Initiating a session. Either authenticator or supplicant can initiate
the message exchange. If supplicant initiates the process, it sends
EAPOL-start packet to the authenticator PAE and authenticator will
immediately respond EAP-Request/Identity packet.
3.
The authenticator always periodically sends EAP-Request/Identity
to the supplicant for requesting the identity it wants to be
authenticated.
4.
If the authenticator doesn’t send EAP-Request/Identity, the
supplicant will initiate EAPOL-Start the process by sending to the
authenticator.
5.
And next, the Supplicant replies an EAP-Response/Identity to the
authenticator. The authenticator will embed the user ID into Radius-
Access-Request command and send it to the authentication server
for confirming its identity.
6.
After receiving the Radius-Access-Request, the authentication
server sends Radius-Access-Challenge to the supplicant for asking
for inputting user password via the authenticator PAE.
7.
The supplicant will convert user password into the credential
information, perhaps, in MD5 format and replies an EAP-Response
with this credential information as well as the specified
authentication algorithm (MD5 or OTP) to Authentication server via
the authenticator PAE. As per the value of the type field in message
PDU, the authentication server knows which algorithm should be
applied to authenticate the credential information, EAP-MD5
(Message Digest 5) or EAP-OTP (One Time Password) or other
else algorithm.
Supplicant A
B
C
Authentication server
Authenticator
Fig. 3-62
Summary of Contents for ProCon GSW-4896
Page 1: ...GSW 4896 48 Port TP with 4 Port shared SFP L2 SNMP Gigabit Switch User Manual Ver 1 01 0711...
Page 6: ......
Page 33: ...User Manual 27 Fig 2 15 Office Network Connection Fig 2 14 Peer to peer Network Connection...
Page 45: ...User Manual 39 T Fig 3 5...
Page 47: ...User Manual 41 Fig 3 6...
Page 74: ...User Manual 68 Fig 3 23b...
Page 76: ...User Manual 70 Fig 3 24b...
Page 78: ...User Manual 72 Fig 3 25b...
Page 80: ...User Manual 74 Fig 3 26b...
Page 84: ...User Manual 78 3 6 4 Flow Fig 3 30...
Page 86: ...User Manual 80 Fig 3 31b...
Page 88: ...User Manual 82 Fig 3 32b...
Page 90: ...User Manual 84 Fig 3 33b...
Page 104: ...User Manual 98 Fig 3 46 Fig 3 47...
Page 136: ...User Manual 130 Fig 3 65...
Page 156: ...User Manual 150 Upload Log Upload log data through tftp Clear Log Clear log data...
Page 163: ...User Manual 157 Fig 3 87...
Page 166: ...User Manual 160 TT Fig 3 89...
Page 176: ...User Manual 170 Fig 4 1 Fig 4 2...
Page 286: ......
Page 287: ......