Eap Over Radius - Dell Force10 Z9000 Configuration Manual

Ftos configuration guide for z9000 system
Hide thumbs Also See for Force10 Z9000:
Table of Contents

Advertisement

3. The authenticator decapsulates the EAP Response from the EAPOL frame, encapsulates it in a
RADIUS Access-Request frame, and forwards the frame to the authentication server.
4. The authentication server replies with an Access-Challenge. The Access-Challenge is request that the
supplicant prove that it is who it claims to be, using a specified method (an EAP-Method). The
challenge is translated and forwarded to the supplicant by the authenticator.
5. The supplicant can negotiate the authentication method, but if it is acceptable, the supplicant provides
the requested challenge information in an EAP Response, which is translated and forwarded to the
authentication server as another Access-Request.
6. If the identity information provided by the supplicant is valid, the authentication server sends an
Access-Accept frame in which network privileges are specified. The authenticator changes the port
state to authorized, and forwards an EAP Success frame. If the identity information is invalid, the
server sends and Access-Reject frame. The port state remains unauthorized, and the authenticator
forwards EAP Failure frame.
Figure 5-2. 802.1X Authentication Process
Supplicant
EAP over LAN (EAPOL)
Request Identity
Response Identity
EAP Request
EAP Reponse
EAP {Sucess | Failure}

EAP over RADIUS

802.1X uses RADIUS to shuttle EAP packets between the authenticator and the authentication server, as
defined in RFC 3579. EAP messages are encapsulated in RADIUS packets as a type of attribute in Type,
Length, Value (TLV) format. The Type value for EAP messages is 79.
Authentication
Authenticator
EAP over RADIUS
Access Request
Access Challenge
Access Request
Access {Accept | Reject}
Server
802.1X | 75

Advertisement

Table of Contents
loading

Table of Contents