cancel
Showing results for 
Search instead for 
Did you mean: 

sequence of communication for 802.1x auth and host checker policy?

SOLVED
aeroplane_
Regular Contributor

sequence of communication for 802.1x auth and host checker policy?

Hi

Can any one explain me the detailed sequence of communication b/w pc, switch and IC for 802.1x authentication and host checker policy ? I mean how process starts to the successful role mapping of users.

Thanks in advance

1 ACCEPTED SOLUTION

Accepted Solutions
IPsec_
Occasional Contributor

Re: sequence of communication for 802.1x auth and host checker policy?

1) Credetial and host check result are sent in form of EAP messages over dot1x..

2) IC takes the decision what role to be assigned

3) Then look for radius attribute policy for what VLAN to be sent for this role

4) Once VLAN is sent, switch port goes to that VLAN

5) Machine does broadcast for IP address in that VLAN.

6) Machine get IP address

7) Then gets network access.

View solution in original post

2 REPLIES 2
IPsec_
Occasional Contributor

Re: sequence of communication for 802.1x auth and host checker policy?

1) Credetial and host check result are sent in form of EAP messages over dot1x..

2) IC takes the decision what role to be assigned

3) Then look for radius attribute policy for what VLAN to be sent for this role

4) Once VLAN is sent, switch port goes to that VLAN

5) Machine does broadcast for IP address in that VLAN.

6) Machine get IP address

7) Then gets network access.

aeroplane_
Regular Contributor

Re: sequence of communication for 802.1x auth and host checker policy?

thanks a lot. its very clear now Smiley Happy