eap-3----Page:3
1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18 

The Participants
+-+-+-+-+
| |
| EAP |
| Peer |
| |
+-+-+-+-+
| | | Peer Ports
/ | \
/ | \
Phase 0: Discovery / | \
Phase 1: Authentication / | \
Phase 2: Secure / | \
Association / | \
/ | \
/ | \
| | | | | | | | | Authenticator Ports
+-+-+-+-+ +-+-+-+-+ +-+-+-+-+
| | | | | |
| Auth. | | Auth. | | Auth. |
| | | | | |
+-+-+-+-+ +-+-+-+-+ +-+-+-+-+
\ | /
\ | /
\ | /
EAP over AAA \ | /
(optional) \ | /
\ | /
\ | /
\ | /
+-+-+-+-+
| |
| AAA |
|Server |
| |
+-+-+-+-+
AAA WG
PPT Version