![Yealink 802.1X Скачать руководство пользователя страница 30](http://html.mh-extra.com/html/yealink/802-1x/802-1x_technical-white-paper_909058030.webp)
Yealink Technical White Paper 802.1X Authentication
30
A Successful Authentication Using EAP-TLS Protocol
The following figure illustrates the scenario of a successful 802.1X authentication process using
the EAP-TLS protocol.
1.
The supplicant sends an “EAPOL-Start” packet to the authenticator.
2.
The authenticator responds with an “EAP-Request/Identity” packet to the supplicant.
3.
The supplicant responds with an "EAP-Response/Identity" packet to the authenticator.
4.
The authenticator strips the Ethernet header and encapsulates the remaining EAP frame in
the RADIUS format, and then sends it to the authentication server.
5.
The authentication server recognizes the packet as an EAP-TLS type and sends an
“EAP-Request” packet with a TLS start message to the authenticator.
6.
The authenticator strips the authentication server’s frame header, encapsulates the
remaining EAP frame in the EAPOL format, and then sends it to the supplicant.
7.
The supplicant responds with an “EAP-Response” packet containing a TLS client hello
handshake message to the authenticator. The client hello message includes the TLS version
supported by the supplicant, a session ID, a random number and a set of cipher suites.
8.
The authenticator passes the response to the authentication server.
9.
The authentication server sends an “EAP-Request” packet to the authenticator. The packet
includes a TLS server hello handshake message, a server certificate message, a certificate
request message and a server hello done message.
10.
The authenticator passes the request to the supplicant.
Содержание 802.1X
Страница 1: ......