Eap Relay - HPE Moonshot 45Gc Security Configuration Manual

Switch module
Table of Contents

Advertisement

Packet exchange
method

EAP relay

Figure 29
shows the basic 802.1X authentication procedure in EAP relay mode, assuming that
EAP-MD5 is used.
Figure 29 802.1X authentication procedure in EAP relay mode
Client
(2) EAP-Request/Identity
(3) EAP-Response/Identity
(6) EAP-Request/MD5-Challenge
(7) EAP-Response/MD5-Challenge
(11) EAP-Request/Identity
(12) EAP-Response/Identity
The following steps describe the 802.1X authentication procedure:
1.
When a user launches the 802.1X client and enters a registered username and password, the
802.1X client sends an EAPOL-Start packet to the access device.
2.
The access device responds with an EAP-Request/Identity packet to ask for the client
username.
3.
In response to the EAP-Request/Identity packet, the client sends the username in an
EAP-Response/Identity packet to the access device.
4.
The access device relays the EAP-Response/Identity packet in a RADIUS Access-Request
packet to the authentication server.
5.
The authentication server uses the identity information in the RADIUS Access-Request to
search its user database. If a matching entry is found, the server uses a randomly generated
Benefits
Device
EAPOL
(1) EAPOL-Start
(10) EAP-Success
Port authorized
...
(13) EAPOL-Logoff
Port unauthorized
(14) EAP-Failure
Limitations
EAPOR
(4) RADIUS Access-Request
(EAP-Response/Identity)
(5) RADIUS Access-Challenge
(EAP-Request/MD5-Challenge)
(8) RADIUS Access-Request
(EAP-Response/MD5-Challenge)
(9) RADIUS Access-Accept
(EAP-Success)
69
The processing is complex on the
access device.
Authentication server

Advertisement

Table of Contents
loading

Table of Contents