19.07.2013 Views

CCNA Complete Guide 2nd Edition.pdf - Cisco Learning Home

CCNA Complete Guide 2nd Edition.pdf - Cisco Learning Home

CCNA Complete Guide 2nd Edition.pdf - Cisco Learning Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Client<br />

(Supplicant)<br />

EAPOL-Start<br />

EAP-Request/Identity<br />

Switch or Access Point<br />

(Authenticator)<br />

EAP-Response/Identity RADIUS Access-Request<br />

EAP-Request/Method<br />

App06-22: 802.1X Authentication Message Exchange<br />

- Below describes a typical WLAN 802.1X authentication process:<br />

1) A wireless client becomes active on the medium. After the IEEE 802.11 WLAN<br />

Probe Request/Response, Authentication, and Association processes, the access point<br />

forces the port into an unauthorized state, which only 802.1X traffic is forwarded.<br />

2) The access point replies with an EAP-Request Identity message to the wireless client to<br />

obtain the client’s identity. The wireless client’s EAP-Response Identity message,<br />

which contains the client’s identity, is forwarded to the authentication server.<br />

3) The authentication server authenticates the wireless client and sends an Access Accept (or<br />

Access Reject) message to the access point.<br />

4) Upon receiving the Access Accept message, the access point relays the EAP-Success<br />

message to the wireless client and transitions the client’s port to an authorized state and<br />

normal traffic is forwarded.<br />

- Note: Below lists the sequence of establishing WLAN connectivity with 802.1X authentication:<br />

Probe Request, Probe Response, Authentication, Association, 802.1X authentication…<br />

- When 802.1X is enabled, ports are authenticated before any other L2 or L3 features are enabled.<br />

- Note: 802.1X is also considered as an efficient and effective alternative solution to port security.<br />

294<br />

RADIUS Access-Challenge<br />

EAP-Response/Method RADIUS Access-Request<br />

EAP-Success<br />

EAPOL-Logoff<br />

Port Authorized<br />

Port Unauthorized<br />

RADIUS Access-Accept<br />

Authentication<br />

Server<br />

(RADIUS)<br />

Copyright © 2008 Yap Chin Hoong<br />

yapchinhoong@hotmail.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!