25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

permits only the exchange of authentication traffic, or more specifically, EAPoL<br />

frames.<br />

Figure 23-2 illustrates the operation of a controlled port in an unauthorized state.<br />

Figure 23-2 Unauthorized port<br />

The authentication traffic that is passed represents traffic where the supplicant<br />

tries to establish its credentials through EAPoL (see “Extensible Authentication<br />

Protocol over LANs (EAPoL)” on page 894) to the authentication server using the<br />

“uncontrolled” port. The authenticator acts as a passage for the authentication<br />

traffic between the supplicant <strong>and</strong> authentication server. The authentication<br />

server verifies <strong>and</strong> validates the authenticity of the supplicant to access the<br />

network resources. The authenticator grants or rejects access for the supplicant<br />

based on the resulting inquiry from the authentication server (RADIUS server).<br />

After the supplicant authenticates successfully with the authentication server, the<br />

network port moves the controlled port to the “authorized” state, allowing the<br />

supplicant to access the computing resources.<br />

Chapter 23. Port based network access control 893

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!