Eap state machines l.jpg
This presentation is the property of its rightful owner.
Sponsored Links
1 / 11

EAP State Machines PowerPoint PPT Presentation


  • 139 Views
  • Updated On :
  • Presentation posted in: General

EAP State Machines. IETF 56 - March 19, 2003 John Vollbrecht [email protected] Nick Petroni [email protected] EAP State Machine. EAP State Machine page http://www.cs.umd.edu/~npetroni/EAP/ EAP State machine Draft http://www.ietf.org/internet-drafts/draft-vollbrecht-eap-state-01.ps

Related searches for EAP State Machines

Download Presentation

EAP State Machines

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Eap state machines l.jpg

EAP State Machines

IETF 56 - March 19, 2003

John Vollbrecht [email protected]

Nick Petroni [email protected]


Eap state machine l.jpg

EAP State Machine

  • EAP State Machine page

    http://www.cs.umd.edu/~npetroni/EAP/

  • EAP State machine Draft

    • http://www.ietf.org/internet-drafts/draft-vollbrecht-eap-state-01.ps

    • http://www.ietf.org/internet-drafts/draft-vollbrecht-eap-state-01.txt


Eap state machine topics l.jpg

EAP State Machinetopics

  • State machine “style”

    • 802.1x coordination

  • Variables, transitions and states

  • EAP Mux model

  • Peer State Machine

  • Authenticator State Machine

  • Pass thru

  • Methods - silent discard vs NAK

  • Policy functions and decisions


State machine style l.jpg

State Machine Style

  • 802.1x format to allow coordination with 802.1x state machine

  • Other formats have been tried


Eap mux model l.jpg

EAP MUX Model

peer

Authenticator

EAP method1

EAP method2

EAP method1

EAP method2

EAP Switch

EAP Switch

link

link


Slide6 l.jpg

Peer State Diagram (07)


Slide7 l.jpg

Authenticator State Machine (07)


Pass thru l.jpg

Pass thru

Client

AP

AAA

EAP method

EAP method1

EAP method1

EAP method

passthru

EAP Switch

EAP Switch

EAP Switch

EAP Switch

link

link

RADIUS

RADIUS


Methods silent discard vs nak l.jpg

Methods - silent discard vs NAK

  • Should Requests for new method be accepted in the middle of another method

    • Talked about yesterday

    • In Peer machine see STRICT from method

    • Alternatively see Policy.allow if Strict is not used

  • Should Success/ Failure be Discarded in the middle of a method

  • Should Methods be able to do method Integrity Checks

  • Method State and implementations

    • Silent discard requires knowing “state” of method


Policy functions l.jpg

Policy Functions

  • Policy Functions determine

    • Policy.allow

      • What methods are allowed when

    • Policy.isSatisfied

      • Is Policy Successful and Complete

    • Policy.getNextMethod

      • Get next method


Eap state machine next steps l.jpg

EAP State Machine- next steps

  • Clean up depending on resolution of issues

  • Add policy function examples

  • Resolve issues with 2284 bis

    • Incorporate into 2284bis?

  • Add state machines for Pass-thru to 2869bis

  • Other?


  • Login