Authentication process – Allied Telesis AT-S60 User Manual
Page 551
AT-S60 Management Software User’s Guide
Section V: Security Features
551
❑ Authentication server - The authentication server is the network
device that has the RADIUS server software. This is the device that
does the actual authenticating of the user names and password
from the supplicants.
The AT-8400 switch does not authenticate the username and passwords
from the clients. Instead, the switch acts as an intermediary between a
supplicant and the authentication server during the authentication
process.
Note
Ports under 802.1x control do not support trunking, STP, or static
and dynamic learning. In addition, ports under 802.1x control must
be a member of a only one VLAN.
Authentication
Process
Below is a brief overview of the authentication process that occurs
between a supplicant, authenticator, and authentication server. For
further details, refer to the IEEE 802.1x standard.
1. An authentication message exchange can be initiated by either the
authenticator port or the supplicant port. The switch initiates an
exchange when it detects a change in the status of a port (such as
when the port transitions from no link to valid link), or if it receives a
packet on the port with a source MAC address not in the MAC address
table.
An authenticator starts the exchange by sending an EAP-
Request/Identity packet. A supplicant starts the exchange with an
EAPOL-Start packet, to which the authenticator responds with a EAP-
Request/Identity packet.
2. The supplicant responds with an EAP-Response/Identity packet to
the authentication server via the authenticator.
3. The authentication server responds with an EAP-Request packet to
the supplicant via the authenticator.
4. The supplicant responds with an EAP-Response/MD5 packet
containing a username and password. This packet is sent to the
authentication server via the authenticator.
5. The authentication server sends either an EAP-Success packet or an
EAP-Reject packet to the supplicant via the authenticator.
6. Upon successful authorization of the supplicant by the
authentication server, the switch adds the supplicant’s MAC address
to the MAC address table as an authorized address and begins
forwarding network traffic to and from the port.