User's Manual

Figure 42: Example of command output
Important:
The CTL file size must not exceed 20 Kbytes.
EAP Authentication
EAP-enabled networks allow the administrator to ensure that individual devices or users are
authorized to access the enterprise's LAN environment.
The following diagram shows the network architecture for 802.1x and EAP.
Figure 43: 802.1x and EAP network architecture
IEEE 802.1x defines three roles:
a supplicant—an entity that requires access to the network for use of its services.
• an authenticator—the network entry point to which the supplicant physically connects,
typically a Layer 2 switch. The authenticator acts as a proxy between the supplicant and
Certificate-based authentication
254 SIP Software for Avaya 1200 Series IP Deskphones-Administration September 2013
Comments? infodev@avaya.com