Eap Over Radius; X Authentication Triggering - 3Com 4510G Configuration Manual

3com switch 4510g family
Table of Contents

Advertisement

the packet is for querying the identity of the client. A value of 4 represents MD5-Challenge, which
corresponds closely to the PPP CHAP protocol.
Figure 2-5 Format of the Data field in an EAP request/response packet
Identifier: Allows matching of responses with requests.
Length: Length of the EAP packet, including the Code, Identifier, Length, and Data fields, in bytes.
Data: Content of the EAP packet. This field is zero or more bytes and its format is determined by
the Code field.

EAP over RADIUS

Two attributes of RADIUS are intended for supporting EAP authentication: EAP-Message and
Message-Authenticator. For information about RADIUS packet format, refer to AAA Configuration in
the Security Volume.
EAP-Message
The EAP-Message attribute is used to encapsulate EAP packets.
format. The value of the Type field is 79. The String field can be up to 253 bytes. If the EAP packet is
longer than 253 bytes, it can be fragmented and encapsulated into multiple EAP-Message attributes.
Figure 2-6 Encapsulation format of the EAP-Message attribute
Message-Authenticator
Figure 2-7
shows the encapsulation format of the Message-Authenticator attribute. The
Message-Authenticator attribute is used to prevent access requests from being snooped during EAP
authentication. It must be included in any packet with the EAP-Message attribute; otherwise, the
packet will be considered invalid and get discarded.
Figure 2-7 Encapsulation format of the Message-Authenticator attribute

802.1X Authentication Triggering

802.1X authentication can be initiated by either a client or the device.
Figure 2-6
2-5
shows its encapsulation

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents