Hi
Can any one explain me the detailed sequence of communication b/w pc, switch and IC for 802.1x authentication and host checker policy ? I mean how process starts to the successful role mapping of users.
Thanks in advance
Solved! Go to Solution.
1) Credetial and host check result are sent in form of EAP messages over dot1x..
2) IC takes the decision what role to be assigned
3) Then look for radius attribute policy for what VLAN to be sent for this role
4) Once VLAN is sent, switch port goes to that VLAN
5) Machine does broadcast for IP address in that VLAN.
6) Machine get IP address
7) Then gets network access.
1) Credetial and host check result are sent in form of EAP messages over dot1x..
2) IC takes the decision what role to be assigned
3) Then look for radius attribute policy for what VLAN to be sent for this role
4) Once VLAN is sent, switch port goes to that VLAN
5) Machine does broadcast for IP address in that VLAN.
6) Machine get IP address
7) Then gets network access.
thanks a lot. its very clear now