User's Manual
FTP_PASSWORD = ****
EAP Authentication
EAP-enabled networks allow the administrator to ensure that individual devices or users are
authorized to access the enterprise's LAN environment.
The following diagram shows the network architecture for 802.1x and EAP.
Figure 56: 802.1x and EAP network architecture
IEEE 802.1x defines three roles:
• a supplicant—an entity that requires access to the network for use of its services.
• an authenticator—the network entry point to which the supplicant physically connects,
typically a Layer 2 switch. The authenticator acts as a proxy between the supplicant and
the authentication server and controls the access to the network based on the
authentication status of the supplicant.
• an authentication server—typically a RADIUS server; performs the actual authentication
of the supplicant.
There are three supported EAP methods:
• EAP-MD5
• EAP-TLS
• EAP-PEAP/MD5
The administrator selects the EAP method from the EAP configuration menu, as shown in the
following figure:
Certificate-based authentication
272 SIP Software for Avaya 1100 Series IP Deskphones-Administration November 2012
Comments? infodev@avaya.com