
Yealink Technical White Paper 802.1X Authentication
34
If the supplicant is disabled or reset after successful authentication, the supplicant sends an
EAPOL-Logoff message, which prompts the authenticator to block access to the LAN.
A Successful Authentication Using EAP-TTLS/EAP-MSCHAPv2
Protocol
The 802.1X authentication process using the EAP-TTLS/EAP-MSCHAPv2 protocol is quite similar
to that using the EAP-PEAP/MSCHAPv2 protocol. For more information, refer to the network
resource.
A Successful Authentication Using EAP-PEAP/GTC Protocol
The 802.1X authentication process using the EAP-PEAP/GTC protocol is quite similar to that
using the EAP-PEAP/MSCHAPv2 protocol. For more information, refer to the network resource.
A Successful Authentication Using EAP-TTLS/EAP-GTC Protocol
The 802.1X authentication process using the EAP-TTLS/EAP-GTC protocol is quite similar to that
using the EAP-PEAP/MSCHAPv2 protocol. For more information, refer to the network resource.
A Successful Authentication Using EAP-FAST Protocol
The 802.1X authentication process using the EAP-FAST protocol is quite similar to that using the
EAP-PEAP/MSCHAPv2 protocol. For more information, refer to the network resource.
Содержание 802.1X
Страница 1: ......