22.10.2013 Views

7.8.1.0 - Force10 Networks

7.8.1.0 - Force10 Networks

7.8.1.0 - Force10 Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4. The authentication server replies with an Access-Challenge. The Access-Challenge is request that the<br />

supplicant prove that it is who it claims to be, using a specified method (an EAP-Method). The<br />

challenge is translated and forwarded to the supplicant by the authenticator.<br />

5. The supplicant can negotiate the authentication method, but if it is acceptable, the supplicant provides<br />

the requested challenge information in an EAP Response, which is translated and forwarded to the<br />

authentication server as another Access-Request.<br />

6. If the identity information provided by the supplicant is valid, the authentication server sends an<br />

Access-Accept frame in which network privileges are specified. The authenticator changes the port<br />

state to authorized, and forwards an EAP Success frame. If the identity information is invalid, the<br />

server sends and Access-Reject frame. The port state remains unauthorized, and the authenticator<br />

forwards EAP Failure frame.<br />

Figure 39 802.1X Authentication Process<br />

Supplicant Authenticator Authentication<br />

Server<br />

EAP over LAN (EAPOL) EAP over RADIUS<br />

Request Identity<br />

Response Identity<br />

EAP Request<br />

EAP Reponse<br />

EAP {Sucess | Failure}<br />

Access Request<br />

Access Challenge<br />

Access Request<br />

Access {Accept | Reject}<br />

84 802.1X

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!