When the client supplies its identity, the authenticator begins its role as the intermediary, passing EAP frames between the supplicant and the authentication server
until authentication succeeds or fails. If the authentication succeeds, the switch port becomes authorized. The specific exchange of EAP frames depends on the
authentication method being used. The figure below shows a message exchange initiated by the client using the MD5 Challenge authentication method with a
RADIUS server.
file:///D|/work%20info/Support%20Note/ZyAIR_G3000H/app/8021x.htm (11 of 27)2005/7/15 下午 02:14:56
Comentarios a estos manuales