switch. If there are two switches directly connected together instead of
single one, for the link connecting two switches, it may have to act two port
roles at the end of the link: authenticator and supplicant, because the traffic
is bi-directional.
The Fig. 61 shows the procedure of 802.1X authentication. There are steps
for the login based on 802.1X port access control management. The
protocol used in the right side is EAPOL and the left side is EAP.
1.
At the initial stage, the supplicant A is unauthenticated and a port on
switch acting as an authenticator is in unauthorized state. So the
access is blocked in this stage.
2.
Initiating a session. Either authenticator or supplicant can initiate the
message exchange. If supplicant initiates the process, it sends
EAPOL-start packet to the authenticator PAE and authenticator will
immediately respond EAP-Request/Identity packet.
3.
The authenticator always periodically sends EAP-Request/Identity to
the supplicant for requesting the identity it wants to be authenticated.
4.
If the authenticator doesn
’t send EAP-Request/Identity, the supplicant
will initiate EAPOL-Start the process by sending to the authenticator.
5.
And next, the Supplicant replies an EAP-Response/Identity to the
authenticator. The authenticator will embed the user ID into Radius-
Access-Request command and send it to the authentication server for
confirming its identity.
6.
After receiving the Radius-Access-Request, the authentication server
sends Radius-Access-Challenge to the supplicant for asking for
inputting user password via the authenticator PAE.
7.
The supplicant will convert user password into the credential
information, perhaps, in MD5 format and replies an EAP-Response
with this credential information as well as the specified authentication
algorithm (MD5 or OTP) to Authentication server via the authenticator
PAE. As per the value of the type field in message PDU, the
authentication server knows which algorithm should be applied to
authenticate the credential information, EAP-MD5 (Message Digest 5)
or EAP-OTP (One Time Password) or other else algorithm.
8.
If user ID and password is correct, the authentication server will send a
Radius-Access-Accept to the authenticator. If not correct, the
authentication server will send a Radius-Access-Reject.
Fig. 4-58
Содержание LGS-2816C-RPS
Страница 4: ...Revision History Release Date Revision 5 17 01 10 2010 B1...
Страница 5: ...CONTENTS...
Страница 56: ...74 CHAPTER 4 Configuring the Switch Configuring Power Saving the manufacturer...
Страница 69: ......
Страница 117: ...Figure 4 50 Access Control List Configuration...
Страница 146: ...164 CHAPTER 4 Configuring the Switch Configure SNMP Port Port identity of switch Port Number 1 24...
Страница 154: ...172 CHAPTER 4 Configuring the Switch Configure SNMP designated port of the root bridge...
Страница 162: ...180 CHAPTER 4 Configuring the Switch Configure SNMP...
Страница 196: ...346 CHAPTER 8 Commands of CLI Alarm Commandsof CLI...
Страница 199: ...346 CHAPTER 8 Commands of CLI Alarm Commandsof CLI...
Страница 207: ...3 Click Upload Figure 110 Display Firmware Upgrade Screen...
Страница 241: ...349 Interfaces Evolution MIB RFC 2863 IP MIB RFC 2011...