

The Authenticator (Network Switch) will create a RADIUS Access-Request message and forward that message to the Authentication Server. Note that RADIUS uses UDP as transport layer protocol and uses port numbers 1812 for authentication and 1813 for accounting (also UDP port number 1645 is used for authentication and 1646 for accounting).

The protocol used for communication between Supplicant and Authenticator is EAPOL protocol, and the protocol used for communication between Authenticator and Authentication Server is RADIUS protocol. Step 04: The Authenticator forwards the information received from the Supplicant to the Authentication Server (RADIUS server, in this case). Step 03: As a response to EAP-Request Identity message, the Supplicant provides its identity (example user name) in an EAP-Response message to the Authenticator (in this case, switch).ĮAP-Response message wireshark capture is shown below. Authenticator sends out EAP-Request Identity periodically, even before receiving an EAPoL-Start message.ĮAP-Request Identity message wireshark capture is shown below.

Step 02: Athenticator will send back EAP-Request Identity message (in response to the EAPOL-Start message), which is used to request identity from the Supplicant, for example, user name.
#Finding the multicast address in wireshark packet capture mac
When the Supplicant first connects to the LAN, it will send EAPoL-Start message to a multicast group (special destination multicast MAC address 01:80:c2:00:00:03) to identify the Authenticator.ĮAPoL-Start message wireshark capture is shown below. Step 01: The first step of IEEE 802.1X (dot1x) Authentication Process is an EAPoL-Start message. IEEE 802.1X (dot1x) Authentication Process The protocol used for communication between Authenticator and Authentication Server is RADIUS. The protocol used for communication between Supplicant and Authenticator is EAPoL. Common EAP methods used in 802.1X (dot1x) are EAP-TLS (EAP-Transport Layer Security) and PEAP-MSCHAPv2 (Protected EAP-Microsoft Challenge Handshake Authentication Protocol version 2). Different EAP methods are available for use in conjunction with IEEE 802.1X (dot1x). EAP method is used to define the credential type and how the credentials are submitted from the Supplicant to the Authentication Server.Įxtensible Authentication Protocol (EAP) is "extensible" by adding new EAP methods. In IEEE 802.1X (dot1x), Extensible Authentication Protocol (EAP) provides a way for the Supplicant and the Authenticator to negotiate an EAP authentication method. Once the user credentials are successfully verified, other user traffic is permitted. Before authentication, the identity of the endpoint is unknown and all traffic is blocked except EAPoL. In a wired Ethernet LAN, EAPoL (Extensible Authentication Protocol (EAP) over LAN) is used to transport EAP packets between Supplicant and an Authenticator over Local Area Network (LAN). IEEE 802.1X (dot1x) uses the Extensible Authentication Protocol (EAP) to exchange messages during the authentication process. Visit following link to learn what is IEEE 802.1X (dot1x) Port Based Authentication, Supplicant, Authenticator and Authentication Server if you are not familiar with IEEE 802.1X (dot1x) Port Based Authentication.
