![Yealink 802.1X Скачать руководство пользователя страница 33](http://html.mh-extra.com/html/yealink/802-1x/802-1x_technical-white-paper_909058033.webp)
Yealink Technical White Paper 802.1X Authentication
33
7.
The supplicant responds with an “EAP-Respond” packet containing a TLS client hello
handshake message to the authenticator. The TLS client hello message includes TLS version
supported by the supplicant, a session ID, a random number and a set of cipher suites.
8.
The authenticator passes the respond to the authentication server.
9.
The authentication server sends an “EAP-Request” packet to the authenticator. The packet
includes a TLS server hello handshake message, a server certificate message and a server
hello done message.
10.
The authenticator passes the request to the supplicant.
11.
The supplicant responds with an “EAP-Response” packet to the authenticator. The packet
includes a TLS change cipher spec message and a certificate verify message
.
12.
The authenticator passes the response to the authentication server.
13.
The authentication server sends an “EAP-Request” packet to the authenticator. The packet
includes a TLS change cipher spec message and a finished handshake message. The change
cipher spec message is sent to notify the authenticator that subsequent records will be
protected under the newly negotiated cipher spec.
14.
The authenticator passes the request to the supplicant.
15.
The supplicant responds with an “EAP-Response” packet to the authenticator.
16.
The authenticator passes the response to the authentication server. The TLS tunnel is
established.
17.
The authentication server sends an “EAP-Request/Identity” packet to the authenticator.
18.
The authenticator passes the request to the supplicant.
19.
The supplicant responds with an “EAP-Response/Identity” packet to the authenticator.
20.
The authenticator passes the response to the authentication server.
21.
The authentication server sends an “EAP-Request” packet to the authenticator. The packet
includes an MSCHAPv2 challenge message.
22.
The authenticator passes the request to the supplicant.
23.
The supplicant responds a challenge message to the authenticator.
24.
The authenticator passes the message to the authentication server.
25.
The authentication server sends a success message indicating that the supplicant provides
proper identity.
26.
The authenticator passes the message to the supplicant.
27.
The supplicant responds with an ACK message to the authenticator.
28.
The authenticator passes the respond message to the authentication server.
29.
The authentication server sends a successful message to the authenticator.
30.
The authenticator passes the message to the supplicant.
After the supplicant is authenticated successfully, the authenticator provides network
access permissions. If the supplicant does not provide proper identification, the
authentication server responds with a rejection message. The authenticator passes the
message to the supplicant and blocks access to the LAN.
Содержание 802.1X
Страница 1: ......