![](/images/backgrounds/293017/hp-v1910-users-manual-120219338x1.png)
Table 100 The network access device relays the Identity
Table 101 The authentication server uses the identity information in the RADIUS
Table 102 The network access device relays the
Table 103 The client uses the received challenge to encrypt the password, and sends the encrypted password in an
Table 104 The network access device relays the
Table 105 The authentication server compares the received encrypted password with the one it generated at step 5. If the two are identical, the authentication server considers the client valid and sends a RADIUS
Table 106 Upon receiving the RADIUS
Table 107 After the client comes online, the network access device periodically sends handshake requests to check whether the client is still online. By default, if two consecutive handshake attempts fail, the device logs off the client.
Table 108 Upon receiving a handshake request, the client returns a response. If the client fails to return a response after a certain number of consecutive handshake attempts (two by default), the network access device logs off the client. This handshake mechanism enables timely release of the network resources used by 802.1X users that have abnormally gone offline.
Table 109 The client can also send an
Table 110 In response to the
NOTE:
In EAP relay mode, the client must use the same authentication method as the RADIUS server. On the network access device, you only need to configure the EAP relay method.
326