Unsolicited triggering of the device, Authentication process of 802.1x, Eap relay – H3C Technologies H3C S7500E Series Switches User Manual
Page 96
5-6
However, some devices along the path from the client to the authentication device may not
support multicast packets with the above destination address, causing the authentication
device unable to receive the authentication request of the client. To solve the problem, the
device also supports EAPOL-Start packets using the broadcast MAC address as the destination
address. Currently, only the iNode 802.1X client supports EAPOL-Start packets using the
broadcast MAC address as the destination address.
Unsolicited triggering of the device
The device can trigger authentication for clients that cannot send EAPOL-Start packets and
therefore cannot trigger authentication, for example, clients that run the 802.1X client software
provided by Windows XP. The device supports two unsolicited triggering modes:
z
Multicast triggering mode: The device multicasts EAP-Request/Identify packets periodically
(every 30 seconds by default).
Unicast triggering mode: Upon receiving a data frame with the source MAC address not in the
MAC address table, the device deems that a new user is attached to itself and sends a
unicast packet out the port receiving the frame to trigger 802.1X authentication. It
retransmits the packet if no response is received within a configured time interval.
Authentication Process of 802.1X
An 802.1X device communicates with a remotely located RADIUS server in two modes: EAP
relay and EAP termination. The following description takes the EAP relay as an example to
show the 802.1X authentication process.
EAP relay
EAP relay is defined in IEEE 802.1X. In this mode, EAP packets are carried in an upper layer
protocol, such as RADIUS, so that they can go through complex networks and reach the
authentication server. Generally, relaying EAP requires that the RADIUS server support the
EAP attributes of EAP-Message and Message-Authenticator, which are used to encapsulate
EAP packets and protect RADIUS packets carrying the EAP-Message attribute respectively.
shows the EAP packet exchange procedure with EAP-MD5.