![Yealink 802.1X Скачать руководство пользователя страница 31](http://html.mh-extra.com/html/yealink/802-1x/802-1x_technical-white-paper_909058031.webp)
Yealink Technical White Paper 802.1X Authentication
31
11.
The supplicant responds with an “EAP-Response” packet to the authenticator. The packet
includes a TLS change cipher spec message, a client certificate message, a client key
exchange message and a certificate verify message
.
12.
The authenticator passes the response to the authentication server.
13.
The authentication server sends an “EAP-Request” packet to the authenticator. The packet
includes a TLS change cipher spec message and a finished handshake message. The change
cipher spec message is sent to notify the authenticator that subsequent records will be
protected under the newly negotiated cipher spec.
14.
The authenticator passes the request to the supplicant.
15.
The supplicant responds with an “EAP-Response” packet to the authenticator.
16.
The authenticator passes the response to the authentication server
.
17.
The authentication server responds with a success message indicating the supplicant and
the authentication server have successfully authenticated each other.
18.
The authenticator passes the message to the supplicant.
After the supplicant is authenticated successfully, the authenticator provides network
access permissions. If the supplicant does not provide proper identification, the
authentication server responds with a rejection message. The authenticator passes the
message to the supplicant and blocks access to the LAN.
If the supplicant is disabled or reset after successful authentication, the supplicant sends an
EAPOL-Logoff message, which prompts the authenticator to block access to the LAN.
Содержание 802.1X
Страница 1: ......