EDS-726 Series User’s Manual

Featured Functions

4.The authenticator sends an “EAP Request/MD5-Challenge” frame to the supplicant. If the RADIUS server is used, the “EAP Request/MD5-Challenge” frame is retrieved directly from the “RADIUS Access-Challenge” frame.

5.The supplicant responds to the “EAP Request/MD5-Challenge” by sending an “EAP Response/MD5-Challenge” frame that encapsulates the user’s password using the MD5 hash algorithm.

6.If the RADIUS server is used as the authentication server, the authenticator relays the “EAP Response/MD5-Challenge” frame from the supplicant by encapsulating it into a “RADIUS Access-Request” frame along with a “Shared Secret,” which must be the same within the authenticator and the RADIUS server, and sends the frame to the RADIUS server. The RADIUS server checks against the password with its database, and replies with “RADIUS Access-Accept” or “RADIUS Access-Reject” to the authenticator. If the Local User Database is used, the password is checked against its database and indicates success or failure to the authenticator.

7.The authenticator sends “EAP Success” or “EAP Failure” by the received indication from the authentication server.

Configuring IEEE 802.1X

802.1X

Setting

Description

Factory Default

Enable/Disable

Click the checkbox(es) under the 802.1X column to

Disable

 

enable IEEE 802.1X for one or more ports. All end

 

 

stations must enter usernames and passwords before

 

 

access to these ports is allowed.

 

3-52

Page 67
Image 67
Moxa Technologies EDS-726 user manual Configuring Ieee, 802.1X