- The PC at user side initiates a connection request.
- The PC and LAC equipment (Eudemon A) negotiate PPP LCP parameters.
- LAC performs PAP (Password Authentication Protocol) or CHAP (Challenge Handshake Authentication Protocol) authentication based on the user information provided by the PC.
- LAC sends the access request, including VPN user name and password, to the RADIUS server for ID authentication.
- The RADIUS server authenticates this user and sends back access accept, such as LNS (Eudemon B)address, after authentication is passed successfully. Meanwhile, LAC is ready for initiating a new tunnel request.
- LAC initiates a tunnel request to the LNS specified by RADIUS server.
- LAC performs PAP or CHAP authentication based on the user information provided by LAC.
Eudemon 8080E/8160E supports PAP authentication and CHAP authentication. - PAP requires twice handshake authentications. The password of PAP is in plain text.
The LAC side first sends the user name and password to the authenticating side. Then the LNS side checks whether the user exists and whether the password is correct according to user configuration, and then returns response (Acknowledge or Not Acknowledge). - CHAP authentication is a three-way handshake authentication with encrypted passwords.
LAC informs LNS of CHAP challenge, and LNS sends back CHAP response and its self CHAP challenge, LAC sends back CHAP response. - Authentication passes.
- LAC transmits the information of CHAP response, response identifier and PPP negotiation parameters to LNS.
- LNS sends the access request to RADIUS server for authentication.
- The RADIUS server re-authenticates this access request and sends back a response if authentication is successful.
- If local mandatory CHAP authentication is configured at LNS, LNS will authenticate the VPN user by sending challenge and the VPN user at PC sends back responses.
- LNS re-sends this access request to RADIUS for authentication.
- RADIUS server re-authenticates this access request and sends back a response if authentication is successful.
- After all authentications are passed, the VPN user can use the resource of the enterprise.
|