12.07.2015 Views

SNMP-GSH2402 - kamery airlive airlivecam

SNMP-GSH2402 - kamery airlive airlivecam

SNMP-GSH2402 - kamery airlive airlivecam

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The overview of operation flow for the Fig. 3-53 is quite simple. WhenSupplicant PAE issues a request to Authenticator PAE, Authenticator andSupplicant exchanges authentication message. Then, Authenticatorpasses the request to RADIUS server to verify. Finally, RADIUS serverreplies if the request is granted or denied.While in the authentication process, the message packets, encapsulatedby Extensible Authentication Protocol over LAN (EAPOL), are exchangedbetween an authenticator PAE and a supplicant PAE. The Authenticatorexchanges the message to authentication server using EAPencapsulation. Before successfully authenticating, the supplicant canonly touch the authenticator to perform authentication messageexchange or access the network from the uncontrolled port.Supplicant’sSystemSupplicantPAEAuthenticator’s SystemServices Offeredby Authenticator(e.g Bridge Relay)AuthenticatorPAEAuthenticationServer’s SystemAuthenticationServerControlled portUncontrolled portPort AuthorizeMAC EnableLANFig. 3-53In the Fig. 3-54, this is the typical configuration, a single supplicant, anauthenticator and an authentication server. B and C is in the internal network, D isAuthentication server running RADIUS, switch at the central location actsAuthenticator connecting to PC A and A is a PC outside the controlled port, runningSupplicant PAE. In this case, PC A wants to access the services on device B and C,first, it must exchange the authentication message with the authenticator on the portit connected via EAPOL packet. The authenticator transfers the supplicant’scredentials to Authentication server for verification. If success, the authenticationserver will notice the authenticator the grant. PC A, then, is allowed to access B andC via the switch. If there are two switches directly connected together instead ofsingle one, for the link connecting two switches, it may have to act two port roles atthe end of the link: authenticator and supplicant, because the traffic is bi-directional.120

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!