![Yealink 802.1X Technical White Paper Download Page 19](http://html.mh-extra.com/html/yealink/802-1x/802-1x_technical-white-paper_909058019.webp)
Yealink Technical White Paper 802.1X Authentication
19
e)
If you select
EAP-PEAP/GTC
:
1)
Enter the user name for authentication in the
Identity
field.
2)
Enter the password for authentication in the
MD5 Password
field.
f)
If you select
EAP-TTLS/EAP-GTC
:
1)
Enter the user name for authentication in the
Identity
field.
2)
Enter the password for authentication in the
MD5
Password
field.
g)
If you select
EAP-FAST
:
1)
Enter the user name for authentication in the
Identity
field.
2)
Enter the password for authentication in the
MD5
Password
field.
3.
Press
Save
to accept the change.
The IP phone reboots automatically to make the settings effective after a period of time.
802.1X Authentication Process
Reboot the phone to activate the 802.1X authentication on the phone. The 802.1X
authentication process is divided into two basic stages:
Pre-authentication
The 802.1X pre-authentication process begins with the IP phone that contains a supplicant
service used for negotiation and authentication. When the IP phone connects to an
unauthorized port, the authenticator blocks the IP phone from connecting to the network. Using
one of the authentication protocols, the authenticator establishes a security negotiation with the
Summary of Contents for 802.1X
Page 1: ......