AirLive SNMP-24MGB User Manual

Page 138

Advertising
background image

4. Web Management in SNMP-24MGB

131

AirLive SNMP-24MGB User’s Manual


In below figure, this is the typical configuration, a single supplicant, an authenticator and an
authentication server. B and C is in the internal network, D is Authentication server running
RADIUS, switch at the central location acts Authenticator connecting to PC A and A is a PC
outside the controlled port, running Supplicant PAE. In this case, PC A wants to access the
services on device B and C, first, it must exchange the authentication message with the
authenticator on the port it connected via EAPOL packet. The authenticator transfers the
supplicant’s credentials to Authentication server for verification. If success, the
authentication server will notice the authenticator the grant. PC A, then, is allowed to
access B and C via the switch. If there are two switches directly connected together instead
of single one, for the link connecting two switches, it may have to act two port roles at the
end of the link: authenticator and supplicant, because the traffic is bi-directional.

The below figure shows the procedure of 802.1X authentication. There are steps for the
login based on 802.1X port access control management. The protocol used in the right side
is EAPOL and the left side is EAP.

1. At the initial stage, the supplicant A is unauthenticated and a port on switch acting as

an authenticator is in unauthorized state. So the access is blocked in this stage.

2. Initiating a session. Either authenticator or supplicant can initiate the message

exchange. If supplicant initiates the process, it sends EAPOL-start packet to the

Supplicant A

B

C

Authentication server

Authenticator

LAN

Authenticator

PAE

Services Offered

by Authenticator

(e.g Bridge Relay)

Authenticator’s System

Authentication

Server’s System

Authentication

Server

Supplicant

PAE

Supplicant’s

System

Uncontrolled port

Controlled port

MAC Enable

Port Authorize

Advertising