Configuring
General 802.1X Authenticator Operation
ii.If the client is successfully authenticated and authorized to con- nect to the network, then the switch allows access to the client. Otherwise, access is denied and the port remains blocked.
This operation provides security on links between
■Switch “A” has port A1 configured for 802.1X supplicant operation.
■You want to connect port A1 on switch “A” to port B5 on switch “B”.
Switch “B”
Port B5
Port A1
Switch “A”
Port A1 Configured as an
802.1X Supplicant
LAN Core | RADIUS Server |
|
1.When port A1 on switch “A” is first connected to a port on switch “B”, or if the ports are already connected and either switch reboots, port A1 begins sending start packets to port B5 on switch “B”.
•If, after the supplicant port sends the configured number of start packets, it does not receive a response, it assumes that switch “B” is not
•If, after sending one or more start packets, port A1 receives a request packet from port B5, then switch “B” is operating as an 802.1X authenticator. The supplicant port then sends a response/ID packet. Switch “B” forwards this request to a RADIUS server.
2.The RADIUS server then responds with an MD5 access challenge that switch “B” forwards to port A1 on switch “A”.