![Yealink 802.1X Скачать руководство пользователя страница 20](http://html.mh-extra.com/html/yealink/802-1x/802-1x_technical-white-paper_909058020.webp)
Yealink Technical White Paper 802.1X Authentication
20
IP phone and creates an 802.1X session. The IP phone provides its authentication information
for the authenticator, and then the authenticator forwards the information to the authentication
server.
Authentication
After the authentication server authenticates the IP phone, the authentication server initiates the
authentication stage of the process. During this phase, the authenticator facilitates an exchange
of keys between the IP phone and the authentication server. After these keys are established,
the authenticator grants the IP phone access to the protected network on an authorized port.
The following figure summarizes an implementation of the 802.1X authentication process using
a RADIUS server as the authentication server:
For more details about the 802.1X authentication
process using EAP-MD5, EAP-TLS,
EAP-PEAP/MSCHAPv2, EAP-TTLS/EAP-MSCHAPv2, EAP-PEAP/GTC, EAP-TTLS/EAP-GTC and
EAP-FAST protocols, refer to
Appendix B: 802.1X Authentication Process
If you are interested in the packets exchanged during the authentication process, we
recommend you to use the Wireshark tool. Refer to
for more
information about the Wireshark tool.
Содержание 802.1X
Страница 1: ......