25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

802.1x authentication process<br />

The authentication process illustrated in Figure 23-5 depicts the basic<br />

step-by-step process of 802.1x authentication of endpoint devices (for example,<br />

workstations).<br />

Step1 Step 2<br />

Network<br />

Supplicant<br />

(end user)<br />

Figure 23-5 Authentication process<br />

From the authentication process shown in Figure 23-5:<br />

1. A workstation is attached to the network, <strong>and</strong> the supplicant initiates a<br />

session with the authenticator. The session is initiated by sending an<br />

EAPoL-Start packet. The authenticator responds by sending an<br />

EAP-Request/Identity packet to the supplicant. The network port can directly<br />

initiate the authentication process by sending an EAP-Request/Identity<br />

packet to the supplicant as soon as the port has become operable with<br />

authentication enabled on it.<br />

2. The supplicant provides its identity by responding to the authenticator with an<br />

EAP-Response/Identity packet. The authenticator forwards this EAP packet<br />

to the authentication server over RADIUS, which verifies the supplicant's<br />

identity.<br />

896 <strong>TCP</strong>/<strong>IP</strong> <strong>Tutorial</strong> <strong>and</strong> <strong>Technical</strong> <strong>Overview</strong><br />

Step 3 Steps 4, 5 (failure)<br />

Authenticator<br />

Unauthorized Access Authorized Access<br />

Authentication Services<br />

Authentication<br />

Server<br />

Step 6<br />

LDAP

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!