25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

EAP is defined in RFC 3478. EAP has the ability to support multiple<br />

authentication mechanisms, making it the best c<strong>and</strong>idate for passing<br />

authentication information from differing computing resources within local area<br />

networks. The different authentication mechanisms include One Time Password<br />

(OTP), Message Digest 5 (MD5), Transport Layer Security (TLS), Tunneled<br />

Transport Layer Security (TTLS), <strong>and</strong> Protected Extensible Authentication<br />

Protocol (PEAP) to provide authentication. Each mechanism has a separate<br />

RFC to describe its usage over EAP. EAP also provides the ability to support<br />

future authentication mechanisms.<br />

Figure 23-4 illustrates the use of 802.1x with multiple authentication protocols.<br />

O<br />

T<br />

P<br />

M<br />

D<br />

5<br />

802.3<br />

Ethernet<br />

T<br />

L<br />

S<br />

T<br />

T<br />

L<br />

S<br />

EAP<br />

802.1x EAPoL<br />

802.5<br />

Token Ring<br />

Figure 23-4 Supplicant protocol stack design<br />

C<br />

H<br />

A<br />

P<br />

P<br />

E<br />

A<br />

P<br />

802.11<br />

Wireless<br />

Chapter 23. Port based network access control 895<br />

F utur<br />

e<br />

T<br />

y<br />

p<br />

e<br />

s

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!