
Yealink Technical White Paper 802.1X Authentication
32
A Successful Authentication Using EAP-PEAP/MSCHAPv2
Protocol
The following figure illustrates the scenario of a successful 802.1X authentication process using
the EAP-PEAP/MSCHAPv2 protocol.
1.
The supplicant sends an “EAPOL-Start” packet to the authenticator.
2.
The authenticator responds with an “EAP-Request/Identity” packet to the supplicant.
3.
The supplicant responds with an "EAP-Response/Identity" packet to the authenticator.
4.
The authenticator strips the Ethernet header and encapsulates the remaining EAP frame in
the RADIUS format, and then sends it to the authentication server.
5.
The authentication server recognizes the packet as a PEAP type and sends an “EAP-Request”
packet with a PEAP start message to the authenticator.
6.
The authenticator strips the authentication server’s frame header, encapsulates the
remaining EAP frame in the EAPOL format, and then sends it to the supplicant.
Содержание 802.1X
Страница 1: ......