![]() ![]() When the last message (message 4 of 4) is acknowledged the virtual controlled port authenticator opens and traffic from the client will flow directly to the router in the flex-vlan Part 2 is creation of crypto keys (4-way handshake).It ends with an Access-Accept from the authentication server to the authenticator and EAP-Success from the authenticator to the supplicant ![]() Part 1 is the authentication of the client.An important part of this process is the traffic flow between the authenticator and authentication server (the blue line) The virtual uncontrolled port on the authenticator opens and allow EAP-traffic through (the red line). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |