103
The overview of operation flow for the
Fig. 3-53
is quite simple. When
Supplicant PAE issues a request to Authenticator PAE, Authenticator and
Supplicant exchanges authentication message. Then, Authenticator
passes the request to RADIUS server to verify. Finally, RADIUS server
replies if the request is granted or denied.
While in the authentication process, the message packets, encapsulated
by
Extensible Authentication Protocol over LAN (EAPOL)
, are
exchanged between an authenticator PAE and a supplicant PAE. The
Authenticator exchanges the message to authentication server using
EAP encapsulation. Before successfully authenticating, the supplicant
can only touch the authenticator to perform authentication message
exchange or access the network from the uncontrolled port.
Fig. 3-53
In the
Fig. 3-54
, this is the typical configuration, a single supplicant, an
authenticator and an authentication server. B and C is in the internal network, D is
Authentication server running RADIUS, switch at the central location acts
Authenticator connecting to PC A and A is a PC outside the controlled port, running
Supplicant PAE. In this case, PC A wants to access the services on device B and C,
first, it must exchange the authentication message with the authenticator on the port
it connected via EAPOL packet. The authenticator transfers the supplicant’s
credentials to Authentication server for verification. If success, the authentication
server will notice the authenticator the grant. PC A, then, is allowed to access B and
C via the switch. If there are two switches directly connected together instead of
single one, for the link connecting two switches, it may have to act two port roles at
the end of the link: authenticator and supplicant, because the traffic is bi-directional.
LAN
Authenticator
PAE
Services Offered
by Authenticator
(e.g Bridge Relay)
Authenticator’s System
Authentication
Server’s System
Authentication
Server
Supplicant
PAE
Supplicant’s
System
Uncontrolled port
Controlled port
MAC Enable
Port Authorize
Содержание L2 Plus
Страница 1: ......
Страница 2: ......
Страница 3: ...16 Port SFP 8 Port Combo GbE L2 Plus Managed Switch...
Страница 4: ...2...
Страница 8: ...6 Revision History Release Date Revision 0 91 2008 03 03 A1 0 95 2008 06 25 A2 0 95 2008 07 21 A2...
Страница 36: ...34 Fig 2 15 Office Network Connection Fig 2 14 Peer to peer Network Connection...
Страница 56: ......
Страница 78: ...22 Fig 3 24...
Страница 81: ...25 Fig 3 26...
Страница 88: ...32 Fig 3 31...
Страница 96: ...40 Fig 3 39 Fig 3 40 Fig 3 41...
Страница 108: ...52 Fig 3 54 Set up Typical Network Application Rules Finish Fig 3 55 Set up Typical Network Application Rules Finish...
Страница 112: ...56 Fig 3 62 Set up VLAN Tag Priority Mapping Finish...
Страница 119: ...63 Fig 3 67 Ingress Port Fig 3 68...
Страница 121: ...65 Fig 3 70...
Страница 122: ...66 Fig 3 71 Fig 3 72 Fig 3 73 ARP...
Страница 123: ...67 Fig 3 74 ARP Fig 3 75 ARP Fig 3 76 ARP Fig 3 77 ARP...
Страница 124: ...68 Fig 3 78 ARP Fig 3 79 ARP Fig 3 80 ARP Fig 3 81 ARP...
Страница 125: ...69 Fig 3 82 ARP Fig 3 83 ARP Fig 3 84 ARP Fig 3 85 ARP Fig 3 86 ARP...
Страница 126: ...70 Fig 3 87 IPv4 Fig 3 88 IPv4 Fig 3 89 IPv4...
Страница 127: ...71 Fig 3 90 IPv4 Fig 3 91 IPv4 Fig 3 92 IPv4 Fig 3 93 IPv4 Fig 3 94 IPv4...
Страница 128: ...72 Fig 3 95 IPv4 Fig 3 96 IPv4 Fig 3 97 IPv4 Fig 3 98 IPv4 Fig 3 99 IPv4...
Страница 129: ...73 Fig 3 100 IPv4 Fig 3 101 IPv4 Fig 3 102 IPv4...
Страница 130: ...74 Fig 3 103 IPv4 Fig 3 104 IPv4 Fig 3 105 IPv4...
Страница 131: ...75 Fig 3 106 IPv4 Fig 3 107 IPv4 Fig 3 108 IPv4...
Страница 132: ...76 Fig 3 109 IPv4 Fig 3 110 IPv4 Fig 3 111 IPv4...
Страница 133: ...77 Fig 3 112 IPv4 Fig 3 113 IPv4 Fig 3 114 IPv4...
Страница 134: ...78 Fig 3 115 IPv4 Fig 3 116 IPv4 Fig 3 117 Action...
Страница 135: ...79 Fig 3 118 Rate Limiter Fig 3 119 Port Copy...
Страница 136: ...80 Fig 3 120 DMAC Filter Fig 3 121 VLAN ID Filter Fig 3 122 VLAN ID Filter...
Страница 148: ...92 Fig 3 125 Set up Policy Rules Fig 3 126 Set up Policy Rules Fig 3 127 Set up Policy Rules...
Страница 149: ...93 Fig 3 128 Set up Policy Rules Finish Fig 3 129 Set up Port Policies Fig 3 130 Set up Port Policies...
Страница 150: ...94 Fig 3 131 Set up Port Policies Fig 3 132 Set up Port Policies Finish...
Страница 151: ...95 Fig 3 133 Set up Typical Network Application Rules Fig 3 134 Set up Typical Network Application Rules...
Страница 164: ...108 Fig 3 143 802 1X Server Configuration...
Страница 168: ...112 Fig 3 145 802 1X Status...
Страница 194: ...138 Fig 3 161 Mirror Configuration...
Страница 214: ...158 Fig 4 1 Fig 4 2 LGB1005A R2 LGB1005A R2 LGB1005A R2 LGB1005A R2...