The Mechanism Of An 802.1X Authentication System; Encapsulation Of Eapol Messages - 3Com 4500 Configuration Manual

26/50-port
Hide thumbs Also See for 4500:
Table of Contents

Advertisement

The controlled port can be used to pass service packets when it is in authorized state. It is blocked
when not in authorized state. In this case, no packets can pass through it.
Controlled port and uncontrolled port are two properties of a port. Packets reaching a port are
visible to both the controlled port and uncontrolled port of the port.
The valid direction of a controlled port
When a controlled port is in unauthorized state, you can configure it to be a unidirectional port, which
sends packets to supplicant systems only.
By default, a controlled port is a unidirectional port.
The way a port is controlled
A port of an H3C series switch can be controlled in the following two ways.
Port-based control. When a port is under port-based control, all the supplicant systems connected
to the port can access the network without being authenticated after one supplicant system among
them passes the authentication. And when the authenticated supplicant system goes offline, the
others are denied as well.
MAC-based control. When a port is under MAC-based control, all supplicant systems connected to
the port have to be authenticated individually in order to access the network. And when a
supplicant system goes offline, the others are not affected.

The Mechanism of an 802.1x Authentication System

IEEE 802.1x authentication system uses the Extensible Authentication Protocol (EAP) to exchange
information between the supplicant system and the authentication server.
Figure 1-2 The mechanism of an 802.1x authentication system
EAP protocol packets transmitted between the supplicant system PAE and the authenticator
system PAE are encapsulated as EAPoL packets.
EAP protocol packets transmitted between the authenticator system PAE and the RADIUS server
can either be encapsulated as EAP over RADIUS (EAPoR) packets or be terminated at system
PAEs. The system PAEs then communicate with RADIUS servers through Password
Authentication Protocol (PAP) or Challenge-Handshake Authentication Protocol (CHAP) packets.
When a supplicant system passes the authentication, the authentication server passes the
information about the supplicant system to the authenticator system. The authenticator system in
turn determines the state (authorized or unauthorized) of the controlled port according to the
instructions (accept or reject) received from the RADIUS server.

Encapsulation of EAPoL Messages

The format of an EAPoL packet
EAPoL is a packet encapsulation format defined in 802.1x. To enable EAP protocol packets to be
transmitted between supplicant systems and authenticator systems through LANs, EAP protocol
packets are encapsulated in EAPoL format. The following figure illustrates the structure of an EAPoL
packet.
1-3

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

4500 pwr

Table of Contents