Introduction to 802.1x
215
■
The Length field indicates the size of an EAP packet, which includes the Code,
Identifier, Length, and Data fields.
■
The Data field contains information about an EAP packet. Its format is different
than the Code field.
A Success or Failure packet does not contain the Data field, so the Length field of
it is 4.
Figure 69 shows the format of the Data field of a Request packet or a Response
packet.
Figure 69
The format of the Data field of a Request packet or a Response packet
■
The Type field indicates the EAP authentication type. A value of 1 indicates
Identity and that the packet is used to query the identity of the peer. A value of
4 represents MD5-Challenge (similar to PPP CHAP) and indicates that the
packet includes query information.
■
The Type Date field differs with types of Request and Response packets.
Newly added fields for EAP authentication
Two fields, EAP-message and Message-authenticator, are added to a RADIUS
protocol packet for EAP authentication.
The EAP-message field, whose format is shown in Figure 70, is used to
encapsulate EAP packets. The maximum size of the string field is 253 bytes. EAP
packets with their size larger than 253 bytes are fragmented and are encapsulated
in multiple EAP-message fields. The type code of the EAP-message field is 79.
Figure 70
The format of an EAP-message field
The Message-authenticator field, whose format is shown in Figure 71, is used to
prevent unauthorized interception to access requesting packets during
authentications using CHAP, EAP, and so on. A packet with the EAP-message field
must also have the Message-authenticator field. Otherwise, the packet is regarded
as invalid and is discarded.
Figure 71
The format of an Message-authenticator field
0
N
Type
Type data
7
0
15
Type
String
7
Length
N
EAP packets
0
2
Type
String
1
Length
18 bytes
Содержание Switch 4210 9-Port
Страница 10: ...Password Control Configuration 556 Displaying Password Control 563 Password Control Configuration Example 564 ...
Страница 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Страница 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Страница 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Страница 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Страница 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Страница 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Страница 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Страница 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Страница 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Страница 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Страница 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Страница 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Страница 340: ...338 CHAPTER 30 CLUSTER ...
Страница 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Страница 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Страница 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Страница 451: ......
Страница 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Страница 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Страница 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...