Blade ICE G8000 manual 802.1X authentication process, Port Unauthorized, Port Authorized

Models: G8000

1 145
Download 145 pages 21.85 Kb
Page 41
Image 41
802.1X authentication process

RackSwitch G8000 Application Guide

802.1X authentication process

The clients and authenticators communicate using Extensible Authentication Protocol (EAP), which was originally designed to run over PPP, and for which the IEEE 802.1X Standard has defined an encapsulation method over Ethernet frames, called EAP over LAN (EAPOL).

Figure 2-1shows a typical message exchange initiated by the client.

802.1X Client

 

RADIUS

 

 

Server

 

 

 

EAPOL

G8000

RADIUS-EAP

 

 

 

 

 

 

 

 

 

(Authenticator)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Ethernet

(RADIUS Client)

UDP/IP

 

 

 

 

 

 

 

 

 

 

 

 

 

Port Unauthorized

EAPOL-Start

EAP-Request (Identity)

EAP-Response (Identity)

EAP-Request (Credentials)

EAP-Response (Credentials)

EAP-Success

Radius-Access-Request

Radius-Access-Challenge

Radius-Access-Request

Radius-Access-Accept

Port Authorized

Figure 2-1Authenticating a Port Using EAPoL

BMD00041, November 2008

Chapter 2: Port-based Network Access Control „ 41

Page 41
Image 41
Blade ICE G8000 manual 802.1X authentication process, Port Unauthorized, Port Authorized