11.06.2015 Views

ES4626-SFP Management Guide.pdf

ES4626-SFP Management Guide.pdf

ES4626-SFP Management Guide.pdf

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The authentication can either be started by supplicant system initiatively or by<br />

devices. When the device detects unauthenticated users to access the network, it will<br />

send supplicant system EAP-Request/Identity messages to start authentication. On the<br />

other hand, the supplicant system can send EAPOL-Start message to the device via<br />

supplicant software.<br />

802.1x system supports EAP relay method and EAP termination method to<br />

implement authentication with the remote RADIUS server. The following is the description<br />

of the process of these two authentication methods, both started by the supplicant<br />

system.<br />

23.1.5.1 EAP Relay Mode<br />

EAP relay is specified in IEEE 802.1x standard to carry EAP in other high-level<br />

protocols, such as EAP over RADIUS, making sure that extended authentication protocol<br />

messages can reach the authentication server through complicated networks. In general,<br />

EAP relay requires the RADIUS server to support EAP attributes: EAP-Message and<br />

Message-Authenticator.<br />

EAP is a widely-used authentication frame to transmit the actual authentication<br />

protocol rather than a special authentication mechanism. EAP provides some common<br />

function and allows the authentication mechanisms expected in the negotiation, which<br />

are called EAP Method. The advantage of EAP lies in that EAP mechanism working as a<br />

base needs no adjustment when a new authentication protocol appears. The following<br />

figure illustrates the protocol stack of EAP authentication method.<br />

Fig 23-8 the Protocol Stack of EAP Authentication Method<br />

By now, there are more than 50 EAP authentication methods has been developed,<br />

the differences among which are those in the authentication mechanism and the<br />

management of keys. The 4 most common EAP authentication methods are listed as<br />

follows:<br />

843

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!