25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 23-6 <strong>and</strong> Figure 23-7 show sniffer traces for two types of authentication,<br />

EAP-MD5 <strong>and</strong> PEAP, respectively. These figures depict all the packets that are<br />

exchanged during successful authentication of a supplicant.<br />

Figure 23-6 EAP-MD5 successful authentication<br />

Figure 23-7 PEAP successful authentication<br />

Figure 23-8 shows a failure.<br />

Figure 23-8 EAP failure<br />

In the 802.1x/EAPoL header (Figure 23-9 on page 899), the Protocol version<br />

field indicates that the EAPoL protocol version is 1. The Packet type field<br />

indicates the type of packet. A value of 0 for this field indicates that it is an EAP<br />

packet. The Packet body length field contains the length of the packet, excluding<br />

the Ethernet <strong>and</strong> EAPoL headers.<br />

In the EAP header, the Code field indicates the type of EAP packet. There are<br />

four types of EAP packets that are exchanged during authentication: request,<br />

898 <strong>TCP</strong>/<strong>IP</strong> <strong>Tutorial</strong> <strong>and</strong> <strong>Technical</strong> <strong>Overview</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!