09-Security Command Reference

HomeSupportSwitchesIE4320 SeriesReference GuidesCommand ReferencesH3C IE4320-EI[IEF4320-EI] Command References-R68xx-6W10009-Security Command Reference
02-802.1X commands
Title Size Download
02-802.1X commands 450.25 KB

Contents

802.1X commands· 1

display dot1x· 1

display dot1x access-profile· 6

display dot1x connection· 8

display dot1x mac-address· 12

display dot1x unicast-trigger quiet-mac· 14

dot1x· 14

dot1x { ip-verify-source | ipv6-verify-source } enable· 15

dot1x access-profile· 16

dot1x access-profile name· 17

dot1x access-user log enable· 18

dot1x after-mac-auth max-attempt 19

dot1x authentication-method· 20

dot1x auth-fail eapol 21

dot1x auth-fail vlan· 21

dot1x auth-server-unavailable escape· 22

dot1x critical eapol 23

dot1x critical vlan· 24

dot1x critical-voice-vlan· 24

dot1x domain-delimiter 25

dot1x duplicate-eapol-start discard· 26

dot1x ead-assistant enable· 27

dot1x ead-assistant free-ip· 28

dot1x ead-assistant permit authentication-escape· 29

dot1x ead-assistant url 30

dot1x eap-success post-authorization· 31

dot1x eap-tls-fragment to-server 32

dot1x eapol untag· 33

dot1x guest-vlan· 34

dot1x guest-vlan-delay· 34

dot1x handshake· 35

dot1x handshake reply enable· 36

dot1x handshake secure· 37

dot1x mac-binding· 38

dot1x mac-binding enable· 39

dot1x mandatory-domain· 39

dot1x max-user 40

dot1x max-user-alarm·· 41

dot1x multicast-trigger 42

dot1x packet-detect enable· 43

dot1x packet-detect retry· 44

dot1x port-control 45

dot1x port-method· 46

dot1x quiet-period· 47

dot1x re-authenticate· 47

dot1x re-authenticate manual 48

dot1x re-authenticate server-unreachable keep-online· 49

dot1x retry· 49

dot1x server-recovery online-user-sync· 50

dot1x timer 51

dot1x timer reauth-period· 54

dot1x unauthenticated-user aging enable· 55

dot1x unicast-trigger 56

dot1x user-ip freeze· 57

reset dot1x access-user 57

reset dot1x guest-vlan· 58

reset dot1x statistics· 59

reset dot1x unicast-trigger quiet-mac· 59

snmp-agent trap enable dot1x· 60

 


802.1X commands

display dot1x

Use display dot1x to display information about 802.1X.

Syntax

display dot1x [ sessions | statistics ] [ interface interface-type interface-number ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

sessions: Displays 802.1X session information.

statistics: Displays 802.1X statistics.

interface interface-type interface-number: Specifies a port by its type and number.

Usage guidelines

If you do not specify the sessions keyword or the statistics keyword, this command displays all information about 802.1X, including session information, statistics, and settings.

If you do not specify the interface interface-type interface-number option, this command displays all global and port-specific 802.1X information.

Examples

# Display all information about 802.1X.

<Sysname> display dot1x

Global 802.1X parameters:

   802.1X authentication                      : Enabled

   EAP authentication                         : Enabled

   Max-tx period                              : 30 s

   Handshake period                           : 15 s

   Offline detect period                      : 300 s

   Quiet timer                                : Disabled

         Quiet period                         : 60 s

   Supp timeout                               : 30 s

   Server timeout                             : 100 s

   Reauth period                              : 3600 s

   Unicast-trigger quiet period               : 0 s

   Max auth requests                          : 2

   User aging period for Auth-Fail VLAN       : 1000 s

   User aging period for critical VLAN        : 1000 s

   User aging period for guest VLAN           : 1000 s

   EAD assistant function                     : Disabled

       Permit authentication-escape           : Disabled

       URL                                    : https://www.example.com

           Track                              : Not configured

       Secondary URL                          : https://www.example.com

           Track                              : 11  (Positive)

       Free IP                                : 6.6.6.0         255.255.255.0

       EAD timeout                            : 30 min

   Domain delimiter                           : @

   Max EAP-TLS fragment (to-server)           : 400 bytes

   Max-user-alarm trigger threshold           : 100%

   Max-user-alarm clear threshold             : 50%

 Online 802.1X wired users                    : 1

 

 GigabitEthernet1/0/1  is link-up

   802.1X authentication                      : Enabled

   Access profile name                        : d1

   Handshake                                  : Enabled

   Handshake reply                            : Disabled

   Handshake security                         : Disabled

   Packet detection                           : Enabled(NOT effective)

   Unicast trigger                            : Disabled

   Periodic reauth                            : Enabled

       Reauth period                          : 120 s

   Port role                                  : Authenticator

   Authorization mode                         : Auto

   Port access control                        : MAC-based

   Multicast trigger                          : Enabled

   Mandatory auth domain                      : Not configured

   Guest VLAN                                 : 3

   Auth-Fail VLAN                             : Not configured

   Critical VLAN                              : Not configured

   Critical voice VLAN                        : Disabled

   Add Guest VLAN delay                       : Disabled

   Re-auth server-unreachable                 : Logoff

   Max online users                           : 4294967295

   Max online preauth-domain users            : 4294967295

   Max online Auth-Fail-domain users          : 4294967295

   User IP freezing                           : Disabled

   Reauth period                              : 0 s

   Send Packets Without Tag                   : Disabled

   Max Attempts Fail Number                   : Not configured

   Unauthenticated-user aging                 : Enabled

   Server-recovery online-user-sync           : Enabled

   Auth-Fail EAPOL                            : Disabled

   Critical EAPOL                             : Disabled

   Discard duplicate EAPOL-Start              : No

   Auth-server-unavailable escape             : Enabled

 

   EAPOL packets: Tx 3, Rx 3

   Sent EAP Request/Identity packets : 1

        EAP Request/Challenge packets: 1

        EAP Success packets: 1

        EAP Failure packets: 0

   Received EAPOL Start packets : 1

            EAPOL LogOff packets: 1

            EAP Response/Identity packets : 1

            EAP Response/Challenge packets: 1

            Error packets: 0

   Online 802.1X users: 1

          MAC address         Auth state

          0001-0000-0000      Authenticated

Table 1 Command output

Field

Description

Global 802.1X parameters

Global 802.1X configuration.

802.1X authentication

Whether 802.1X is enabled globally.

CHAP authentication

Performs EAP termination and uses CHAP to communicate with the RADIUS server.

EAP authentication

Relays EAP packets and supports any of the EAP authentication methods to communicate with the RADIUS server.

PAP authentication

Performs EAP termination and uses PAP to communicate with the RADIUS server.

Max-tx period

Username request timeout timer in seconds.

Handshake period

Handshake timer in seconds.

Offline detect period

The S6820 switch series does not support this field.

Offline detection timer in seconds.

Quiet timer

Status of the quiet timer, enabled or disabled.

Quiet period

Quiet timer in seconds.

Supp timeout

Client timeout timer in seconds.

Server timeout

Server timeout timer in seconds.

Reauth period

Periodic reauthentication timer in seconds.

Unicast-trigger quiet period

Unicast-trigger quiet timer. If this timer starts for an unknown source MAC address, the unicast trigger will not send requests to that MAC address until after this timer expires.

Max auth requests

Maximum number of attempts for sending an authentication request to a client.

User aging period for Auth-Fail VLAN

Aging timer in seconds for users in Auth-Fail VLANs.

User aging period for critical VLAN

Aging timer in seconds for users in critical VLANs.

User aging period for guest VLAN

Aging timer in seconds for users in guest VLANs.

EAD assistant function

Whether EAD assistant is enabled.

Permit authentication-escape

Support for correctly using Auth-Fail VLANs or critical VLANs when 802.1X EAD assistant is enabled.

URL

Redirect URL for unauthenticated users using a Web browser to access the network.

Secondary URL

Secondary redirect URL for unauthenticated users using a Web browser to access the network.

Track

Number of the track entry associated with the redirect URL and the track entry state.

If the redirect URL is not associated with a track entry, this field displays Not configured.

Free IP

Network segment accessible to unauthenticated users.

EAD timeout

EAD rule timer in minutes.

Domain delimiter

Domain delimiters supported by the device.

Max EAP-TLS fragment (to-server)

Maximum size of EAP-TLS fragments sent in authentication packets to the server.

If no maximum size is set, this field displays N/A.

Max-user-alarm trigger threshold

Alarm threshold for 802.1X user access ratio, in percentage.

Max-user-alarm clear threshold

Alarm clear threshold for 802.1X user access ratio, in percentage.

Online 802.1X wired users

Number of wired online 802.1X users, including users that have passed 802.1X authentication and users that are performing 802.1X authentication.

GigabitEthernet1/0/1 is link-up

Status of the port. In this example, GigabitEthernet 1/0/1 is up.

802.1X authentication

Whether 802.1X is enabled on the port.

Access profile name

Name of an 802.1X access profile. If no 802.1X access profile is applied to the port, this field displays Not configured.

Handshake

Whether the online user handshake feature is enabled on the port.

Handshake reply

Whether the online user handshake reply feature is enabled on the port.

Handshake security

Whether the online user handshake security feature is enabled on the port.

Packet detection

Status of packet detection for 802.1X authentication:

·     Enabled—This feature is enabled and effective.

·     Disabled—This feature is disabled.

·     Enabled(NOT effective)—This feature is enabled but it does not take effect. This state is displayed when the port access control mode is port-based.

Unicast trigger

Whether the 802.1X unicast trigger is enabled on the port.

Periodic reauth

Whether 802.1X periodic reauthentication is enabled on the port.

Reauth period

Periodic reauthentication timer on the port.

If no periodic reauthentication timer is configured on the port, this field displays N/A.

If 802.1X periodic reauthentication is not enabled on the port, this field is not available.

Port role

Role of the port. The port functions only as an Authenticator.

Authorization mode

Authorization state of the port, which can be Force-Authorized, Auto, or Force-Unauthorized.

Port access control

Access control method of the port:

·     MAC-based—MAC-based access control.

·     Port-based—Port-based access control.

Multicast trigger

Whether the 802.1X multicast trigger feature is enabled.

Mandatory auth domain

Mandatory authentication domain on the port.

Guest VLAN

802.1X guest VLAN configured on the port.

If no 802.1X guest VLAN is configured on the port, this field displays Not configured.

Auth-Fail VLAN

802.1X Auth-Fail VLAN configured on the port.

If no 802.1X Auth-Fail VLAN is configured on the port, this field displays Not configured.

Critical VLAN

802.1X critical VLAN configured on the port.

If no 802.1X critical VLAN is configured on the port, this field displays Not configured.

Critical voice VLAN

Whether the 802.1X critical voice VLAN feature is enabled on the port.

Add Guest VLAN delay

Status and mode of the 802.1X guest VLAN assignment delay feature on a port:

·     EAPOL—EAPOL-triggered 802.1X guest VLAN assignment delay is enabled.

·     NewMac—New MAC-triggered 802.1X guest VLAN assignment delay is enabled.

·     ALL—Both EAPOL-triggered and new MAC-triggered 802.1X guest VLAN assignment delays are enabled.

·     Disabled—802.1X guest VLAN assignment delay is disabled.

Re-auth server-unreachable

Whether to log off online 802.1X users or keep them online when no server is reachable for 802.1X reauthentication.

Max online users

Maximum number of concurrent 802.1X users on the port.

Max online preauth-domain users

Maximum number of 802.1X users in the preauthentication domain on the port.

Max online Auth-Fail-domain users

Maximum number of 802.1X users in the Auth-Fail domain on the port.

User IP freezing

Whether user IP freezing is enabled on the port.

Reauth period

Periodic reauthentication timer in seconds on the port.

Send Packets Without Tag

Whether to remove the VLAN tags of all 802.1X protocol packets sent out of the port to 802.1X clients.

Max Attempts Fail Number

Maximum number of 802.1X authentication attempts for MAC authenticated users.

Unauthenticated-user aging

Status of 802.1X unauthenticated user aging on a port:  

·     Enabled.

·     Disabled.

Server-recovery online-user-sync

Status of 802.1X online user synchronization:

·     Enabled.

·     Disabled.

Auth-Fail EAPOL

This field displays whether the device sends EAP-Success packets to 802.1X clients on their assignment to the 802.1X Auth-Fail VLAN on the port.

Critical EAPOL

This field displays whether the device sends EAP-Success packets to 802.1X clients on their assignment to the 802.1X critical VLAN on the port.

Discard duplicate EAPOL-Start

Whether the device discards duplicate EAPOL-Start requests on the port.

Auth-server-unavailable escape

Whether the online 802.1X users can escape from offline detection to stay online when all RADIUS servers are unreachable.

Available options:

·     Enabled—Online 802.1X users can escape from offline detection to stay online when all RADIUS servers are unreachable.

·     Disabled—Online 802.1X users cannot escape from offline detection when all RADIUS servers are unreachable.

EAPOL packets

Number of sent (Tx) and received (Rx) EAPOL packets.

Sent EAP Request/Identity packets

Number of sent EAP-Request/Identity packets.

EAP Request/Challenge packets

Number of sent EAP-Request/MD5-Challenge packets.

EAP Success packets

Number of sent EAP-Success packets.

EAP Failure packets

Number of sent EAP-Failure packets.

Received EAPOL Start packets

Number of received EAPOL-Start packets.

EAPOL LogOff packets

Number of received EAPOL-LogOff packets.

EAP Response/Identity packets

Number of received EAP-Response/Identity packets.

EAP Response/Challenge packets

Number of received EAP-Response/MD5-Challenge packets.

Error packets

Number of received error packets.

Online 802.1X users

Number of online 802.1X users on the port, including users that have passed 802.1X authentication and users that are performing 802.1X authentication.

MAC address

MAC addresses of the online 802.1X users.

Auth state

Authentication status of the online 802.1X users.

display dot1x access-profile

Use display dot1x access-profile to display information about 802.1X access profiles.

Syntax

display dot1x access-profile [ name profile-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

name profile-name: Specifies an 802.1X access profile by its name, a case-insensitive string of 1 to 31 characters. If you do not specify an 802.1X access profile, this command displays brief information for all 802.1X access profiles.

Usage guidelines

Use this command to verify the configuration of 802.1X access profiles.

Examples

# Display brief information for all 802.1X access profiles.

<Sysname> display dot1x access-profile

Total number: 2

Profile name                     Packet detection

aaa                              Disabled

bbb                              Disabled

# Display information about 802.1X access profile profile1.

<Sysname> display dot1x access-profile name profile1

Handshake                                  : Enabled

Unicast trigger                            : Disabled

Guest VLAN                                 : 3

Auth-Fail VLAN                             : Not configured

Critical VLAN                              : Not configured

Max online users                           : 4294967295

Max online preauth-domain users            : 4294967295

Max online Auth-Fail-domain users          : 4294967295

Packet detection                           : Enabled

Packet detection retry times               : 2

Add Guest VLAN delay                       : Disabled

 

Total auth-profiles bound to the access profile: 3

   Authprofile1

   Authprofile2

   Authprofile3

Table 2 Command output

Field

Description

Profile name

Name of an 802.1X access profile.

Handshake

Status of online user handshake:

·     Enabled.

·     Disabled.

Unicast trigger

Status of unicast trigger:

·     Enabled.

·     Disabled.

Guest VLAN

Guest VLAN configured in the 802.1X access profile. If no guest VLAN is configured, this field displays Not configured.

Auth-Fail VLAN

Auth-Fail VLAN configured in the 802.1X access profile. If no Auth-Fail VLAN is configured, this field displays Not configured.

Critical VLAN

Critical VLAN configured in the 802.1X access profile. If no critical VLAN is configured, this field displays Not configured.

Max online users

Maximum number of concurrent 802.1X users on a port.

Max online preauth-domain users

Maximum number of 802.1X users in the preauthentication domain on a port.

Max online Auth-Fail-domain users

Maximum number of 802.1X users in the Auth-Fail domain on a port.

Packet detection

Status of the packet detection feature for 802.1X authentication:

·     Enabled.

·     Disabled.

Packet detection retry times

Maximum number of attempts for sending a detection packet to a user.

Total auth-profiles bound to the access profile

Number of port security authentication profiles to which the 802.1X access profile is bound.

Add Guest VLAN delay

Status and mode of the 802.1X guest VLAN assignment delay feature on a port:

·     EAPOL—EAPOL-triggered 802.1X guest VLAN assignment delay is enabled.

·     NewMac—New MAC-triggered 802.1X guest VLAN assignment delay is enabled.

·     ALL—Both EAPOL-triggered and new MAC-triggered 802.1X guest VLAN assignment delays are enabled.

·     Disabled—802.1X guest VLAN assignment delay is disabled.

display dot1x connection

Use display dot1x connection to display information about online 802.1X users.

Syntax

display dot1x connection [ open ] [ [ interface interface-type interface-number | online-type { auth-fail-domain | critical-domain | preauth-domain | success } | slot slot-number | user-name name-string ] | user-mac mac-address ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

open: Displays information only about 802.1X users that use nonexistent usernames or incorrect passwords for network access in open authentication mode. If you do not specify this keyword, the command displays information about all online 802.1X users.  

interface interface-type interface-number: Specifies a port by its type and number. If you do not specify a port, this command displays online 802.1X user information for all ports.

online-type: Specifies a type of online 802.1X users.

·     auth-fail-domain: Specifies 802.1X users in the Auth-Fail domain.

·     critical-domain: Specifies 802.1X users in the critical domain.

·     preauth-domain: Specifies 802.1X users in the preauthentication domain.

·     success: Specifies users that have passed 802.1X authentication.

slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command displays online 802.1X user information for all member devices.

user-mac mac-address: Specifies an 802.1X user by MAC address. The mac-address argument represents the MAC address of the user, in the form of H-H-H. If you do not specify an 802.1X user, this command displays all online 802.1X user information.

user-name name-string: Specifies an 802.1X user by its name. The name-string argument represents the username, a case-sensitive string of 1 to 253 characters. If you do not specify an 802.1X user, this command displays all online 802.1X user information.

Examples

# Display information about all online 802.1X users.

<Sysname> display dot1x connection

Total connections: 1

Slot ID: 1

User MAC address: 0015-e9a6-7cfe

Access interface: GigabitEthernet1/0/1

Username: ias

User access state: Successful

Authentication domain: aaa

IPv4 address: 192.168.1.1

IPv6 address: 2000:0:0:0:1:2345:6789:abcd

IPv4 address source: User packet

IPv6 address source: User packet

EAP packet identifier: 4

Authentication method: CHAP

AAA authentication method: RADIUS

Initial VLAN: 1

Authorization untagged VLAN: 6

Authorization tagged VLAN list: 1 to 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 29 31 33

                                35 37 40 to 100

Authorization ACL number/name: 3001

Authorization dynamic ACL name: N/A

Authorization user profile: N/A

Authorization CAR: N/A

Authorization URL: N/A

Authorization IPv6 URL: N/A

Authorization temporary redirect: Disabled

Start accounting: Successful

Real-time accounting-update failures: 0

Termination action: Default

Session timeout period: 2 sec

Offline detection: 100 sec (command-configured)

Remaining reauth attempts: 2

Packet detection:

  Max attempts: 5

  Remaining attempts: 3

  Source IPv4 address: 192.168.1.3

  Source IPv4 mask: 255.255.0.0

Topology change detection:

  Max attempts: 5

  Remaining attempts: 3

Online from: 2013/03/02  13:14:15

Online duration: 0h 2m 15s

Table 3 Command output

Field

Description

Total connections

Number of online 802.1X users.

User MAC address

MAC address of the user.

Access interface

Interface through which the user access the device.

Username

Username. If this field displays UserLoginMab, the user comes online through 802.1X MAC bypass authentication. If this field does not display UserLoginMab, the user comes online through regular 802.1X authentication.

User access state

Access state of the user.

·     Auth-Fail domain—The user is in the Auth-Fail domain.

·     Critical domain—The user is in the critical domain.

·     Preauth domain—The user is in the preauthentication domain.

·     Successful—The user passes 802.1X authentication and comes online.

·     Open—The user uses a nonexistent username or an incorrect password to come online in open authentication mode.

Authentication domain

ISP domain used for 802.1X authentication.

IPv4 address

IPv4 address of the user.

If the device does not get the IPv4 address of the user, this field is not available.

IPv6 address

IPv6 address of the user.

If the device does not get the IPv6 address of the user, this field is not available.

IPv4 address source

Source of the user IPv4 address:

·     User packet—The IPv4 address was obtained from a user packet.

·     IP Source Guard—The IPv4 address was received from the IP source guard module.

IPv6 address source

Source of the user IPv6 address:

·     User packet—The IPv6 address was obtained from a user packet.

·     IP Source Guard—The IPv6 address was received from the IP source guard module.

EAP packet identifier

EAP packet identifier of the user.

Authentication method

EAP message handling method in 802.1X:

·     CHAP—Performs EAP termination and uses CHAP to communicate with the RADIUS server.

·     EAP—Relays EAP packets and supports any of the EAP authentication methods to communicate with the RADIUS server.

·     PAP—Performs EAP termination and uses PAP to communicate with the RADIUS server.

AAA authentication method

AAA authentication method used for the user to come online:

·     Local—Local authentication.

·     RADIUS—RADIUS authentication.

·     None—No authentication was performed.

·     N/A—User came online with restricted access because of an unsuccessful authentication attempt. For example, the user might have been placed in a critical domain or authen-fail domain.

Initial VLAN

VLAN to which the user belongs before 802.1X authentication.

Authorization untagged VLAN

Untagged VLAN authorized to the user.

The VLAN assigned by the server to a user as an authorization VLAN might have been configured on the user access port but with a different tagging mode. For example, the server assigns an authorization VLAN with a tagged attribute, but the same VLAN configured on the port has an untagged attribute. In this situation, if the link type of the port is hybrid, the VLAN settings configured on the port take effect on the user. For more information, see 802.1X in Security Configuration Guide.

Authorization tagged VLAN list

Tagged VLANs authorized to the user.

The VLAN assigned by the server to a user as an authorization VLAN might have been configured on the user access port but with a different tagging mode. For example, the server assigns an authorization VLAN with a tagged attribute, but the same VLAN configured on the port has an untagged attribute. In this situation, if the link type of the port is hybrid, the VLAN settings configured on the port take effect on the user. For more information, see 802.1X in Security Configuration Guide.

Authorization ACL number/name

Number or name of the static ACL authorized to the user.

If no static ACL has been authorized to the user, this field displays N/A.

If ACL authorization failed, this field displays (NOT effective) next to the ACL number or name.

Authorization dynamic ACL name

Name of the dynamic ACL authorized to the user.

If no dynamic ACL has been authorized to the user, this field displays N/A.

If ACL authorization failed, this field displays (NOT effective) next to the ACL name.

Authorization user profile

User profile authorized to the user.

Authorization CAR

This field is not supported in the current software version.

Authorization CAR attributes assigned by the server.

If no authorization CAR attributes are assigned, this field displays N/A.

Authorization URL

Redirect URL authorized to the user.

Authorization IPv6 URL

IPv6 redirect URL authorized to the user.

Authorization temporary redirect

State of temporary redirection authorization:

·     Enabled—Temporary redirection is authorized. The HTTP or HTTPS redirection packets sent to the user include state code 302.

·     Disabled—Temporary redirection is not authorized. The HTTP or HTTPS redirection packets sent to the user include state code 200.

Start accounting

Start-accounting request result:

·     Successful.

·     Failed.

The device does not support accounting for users in the preauthentication domain. For such users, this field displays N/A.

Real-time accounting-update failures

Number of consecutive real-time accounting-update failures.

Termination action

Action attribute assigned by the server to terminate the user session:

·     Default—Logs off the online authenticated 802.1X user when the server-assigned session timeout timer expires. This attribute does not take effect when 802.1X periodic reauthentication is enabled and the periodic reauthentication timer is shorter than the server-assigned session timeout timer.

·     RADIUS-request—Reauthenticates the online user when the server-assigned session timeout timer expires, regardless of whether the 802.1X periodic reauthentication feature is enabled or not.

If the device performs local authentication, this field displays Default.

Session timeout period

Session timeout timer assigned by the server.

Offline detection

This field is not supported in the current software version.

Offline detection method for the user:

·     timer (command-configured)—The offline detection timer value configured from the CLI. The timer argument represents the timer value.

·     Ignore (server-assigned)—The RADIUS server instructed the device to detect the offfline state of the user.

·     timer (server-assigned)—The offline detection timer value assigned by the RADIUS server. The timer argument represents the timer value.

Remaining reauth attempts

Number of remaining re-authentication attempts.

Packet detection

Information about the packet detection feature.

Topology change detection

Information about ARP or NS packet detection after a topology change.

Max attempts

Maximum number of attempts for sending a detection packet to the user.

Remaining attempts

Remaining number of attempts for sending a detection packet to the user. The device decreases the number by 1 each time it makes an attempt to send the detection packet to the user.

Source IPv4 address

IP address specified for calculating the source IP address of ARP detection packets.

If no IP address is specified, this field displays 0.0.0.0.

Source IPv4 mask

Mask specified for calculating the source IP address of ARP detection packets.

If no mask is specified, this field displays 0.0.0.0.

Online from

Time from which the 802.1X user came online.

Online duration

Online duration of the 802.1X user.

 

display dot1x mac-address

Use display dot1x mac-address to display the MAC addresses of 802.1X users in a type of 802.1X VLAN.

Syntax

display dot1x mac-address { auth-fail-vlan | critical-vlan | guest-vlan } [ interface interface-type interface-number ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

auth-fail-vlan: Specifies 802.1X Auth-Fail VLANs.

critical-vlan: Specifies 802.1X critical VLANs.

guest-vlan: Specifies 802.1X guest VLANs.

interface interface-type interface-number: Specifies a port by its type and number. If you do not specify a port, this command displays the MAC addresses of 802.1X users in the specified type of 802.1X VLAN on all ports.

Usage guidelines

The displayed MAC addresses and MAC address count might not include all MAC addresses if a large number of 802.1X users are performing authentication frequently.

Examples

# Display the MAC addresses of 802.1X users in the 802.1X Auth-Fail VLANs on all ports.

<Sysname> display dot1x mac-address auth-fail-vlan

Total MAC addresses: 10

Interface: GigabitEthernet1/0/1        Auth-Fail VLAN: 3    Aging time: N/A

MAC addresses: 8

  0800-2700-9427    0800-2700-2341    0800-2700-2324    0800-2700-2351

  0800-2700-5627    0800-2700-2251    0800-2700-8624    0800-2700-3f51

 

Interface: GigabitEthernet1/0/2        Auth-Fail VLAN: 5    Aging time: 30 sec

MAC addresses: 2

  0801-2700-9427    0801-2700-2341

Table 4 Command output

Field

Description

Total MAC addresses

Total number of MAC addresses in the specified type of VLAN, on the specified port or all ports.

Interface

Access port of 802.1X users.

Type VLAN

VLAN that contains the 802.1X users.

Available VLAN types:

·     Auth-Fail VLAN.

·     Critical VLAN.

·     Guest VLAN.

Aging time

MAC address aging time in seconds.

This field displays N/A if the MAC addresses do not age out.

MAC addresses

Number of matching MAC addresses on a port.

xxxx-xxxx-xxxx

MAC address.

Related commands

dot1x auth-fail vlan

dot1x critical vlan

dot1x guest-vlan

display dot1x unicast-trigger quiet-mac

Use display dot1x unicast-trigger quiet-mac to display unknown source MAC addresses in the unicast-trigger quiet period.

Syntax

display dot1x unicast-trigger quiet-mac [ interface interface-type interface-number ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

interface interface-type interface-number: Specifies a port by its type and number. If you do not specify a port, this command displays all unknown source MAC addresses in the unicast-trigger quiet period.

Usage guidelines

After the unicast-trigger quiet timer starts for an unknown source MAC address, that MAC address will stay in the unicast-trigger quiet period until the timer expires.

Examples

# Display all unknown source MAC addresses in the unicast-trigger quiet period

<Sysname> display dot1x unicast-trigger quiet-mac

Total unicast-trigger quiet MAC addresses: 1

 MAC address           VLAN ID         Interface

 0800-2700-a4f7        1               GE1/0/1

Table 5 Command output

Field

Description

Total unicast-trigger quiet MAC addresses

Current total number of source MAC addresses in the unicast-trigger quiet period.

MAC address

Source MAC address in the unicast-trigger quiet period.

VLAN ID

VLAN in which the MAC address is located.

Interface

Port to which the MAC address is attached.

 

Related commands

dot1x timer

reset dot1x unicast-trigger quiet-mac

dot1x

Use dot1x to enable 802.1X globally or on a port.

Use undo dot1x to disable 802.1X globally or on a port.

Syntax

dot1x

undo dot1x

Default

802.1X is neither enabled globally nor enabled for any port.

Views

System view

Layer 2 Ethernet interface view

Predefined user roles

network-admin

Usage guidelines

For the 802.1X feature to take effect on a port, you must enable the feature both globally and on the port.

Examples

# Enable 802.1X globally.

<Sysname> system-view

[Sysname] dot1x

# Enable 802.1X on GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x

[Sysname-GigabitEthernet1/0/1] quit

Related commands

display dot1x

dot1x { ip-verify-source | ipv6-verify-source } enable

Use dot1x { ip-verify-source | ipv6-verify-source } enable to enable generation of dynamic IPv4SG or IPv6SG binding entries for 802.1X authenticated users.

Use undo dot1x { ip-verify-source | ipv6-verify-source } enable to disable generation of dynamic IPv4SG or IPv6SG binding entries for 802.1X authenticated users.

Syntax

dot1x { ip-verify-source | ipv6-verify-source } enable

undo dot1x { ip-verify-source | ipv6-verify-source } enable

Default

Generation of dynamic IPv4SG or IPv6SG binding entries for 802.1X authenticated users is enabled.

Views

Layer 2 Ethernet interface view

Predefined user roles

network-admin

Usage guidelines

IMPORTANT

IMPORTANT:

This feature must operate in conjunction with the IP source guard (IPSG) feature.

 

The dot1x { ip-verify-source | ipv6-verify-source } enable command takes effect only on 802.1X users that come online after the command is used. If the IP address of an online 802.1X user changes, the device will update the dynamic IPv4SG or IPv6SG binding entry for the user.

The undo dot1x { ip-verify-source | ipv6-verify-source } enable command does not delete the existing dynamic IPv4SG or IPv6SG binding entries for online 802.1X users. If the IP address of an online 802.1X user changes after the command is used, the device will delete the dynamic IPv4SG or IPv6SG binding entry for the user.

Examples

# Disable generation of dynamic IPv4SG or IPv6SG binding entries for 802.1X authenticated users on GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] undo dot1x ip-verify-source enable

dot1x access-profile

Use dot1x access-profile to bind an 802.1X access profile to a port security authentication profile.

Use undo dot1x access-profile to restore the default.

Syntax

dot1x access-profile profile-name

undo dot1x access-profile profile-name

Default

No 802.1X access profile is bound to a port security authentication profile.

Views

Port security authentication profile view

Predefined user roles

network-admin

Parameters

profile-name: Specifies an 802.1X access profile by its name, a case-insensitive string of 1 to 31 characters.

Usage guidelines

Operating mechanism

After you bind a port security authentication profile to an interface:

·     For settings that can be configured both in interface view and 802.1X access profile view (the command lines might differ in the views), the system automatically deletes the settings in interface view regardless of whether the port security authentication profile has been bound to an 802.1X access profile. To use these settings, configure them in the 802.1X access profile bound to the port security authentication profile.

·     For settings that can be configured in interface view but cannot be configured in 802.1X access profile view, they can still take effect after you apply an 802.1X access profile to that interface.

After you bind an 802.1X access profile to a port security authentication profile, the interfaces to which the port security authentication profile is applied will use the settings in the 802.1X access profile to authenticate access users.

Prerequisites

To successfully bind an 802.1X access profile to a port security authentication profile, you must first create that 802.1X access profile by using the dot1x access-profile name command in system view.

Restrictions and guidelines

An 802.1X access profile can be bound to multiple port security authentication profiles, but a port security authentication profile can bind only one 802.1X access profile. To change the 802.1X access profile bound to a port security authentication profile, you must first remove the original binding.

Examples

# Bind 802.1X access profile bbb to port security authentication profile aaa.

<Sysname> system-view

[Sysname] port-security authentication-profile name aaa

[Sysname-portsec-auth-profile-aaa] dot1x access-profile bbb

Related commands

display dot1x access-profile

port-security authentication-profile name

dot1x access-profile name

Use dot1x access-profile name to create an 802.1X access profile and enter its view, or enter the view of an existing 802.1X access profile.

Use undo dot1x access-profile name to delete an 802.1X access profile.

Syntax

dot1x access-profile name profile-name

undo dot1x access-profile name profile-name

Default

No 802.1X access profiles exist.

Views

System view

Predefined user roles

network-admin

Parameters

profile-name: Specifies a name for the 802.1X access profile, which is a case-insensitive string of 1 to 31 characters.

Usage guidelines

Application scenarios

The device uses 802.1X access profiles to manage 802.1X access settings in a unified manner. After you bind an 802.1X access profile to a port security authentication profile, the interfaces to which the port security authentication profile is applied will use the settings in the 802.1X access profile to authenticate access users.

Restrictions and guidelines

Repeat this command to create multiple 802.1X access profiles.

Deleting the 802.1X access profile bound to a port security authentication profile will cause online users to go offline abnormally if the access profile has taken effect.

Examples

# Create an 802.1X access profile named bbb and enter its view.

<Sysname> system-view

[Sysname] dot1x access-profile name bbb

[Sysname-dot1x-acc-prof-bbb]

Related commands

display dot1x access-profile

dot1x access-user log enable

Use dot1x access-user log enable to enable 802.1X user logging.

Use undo dot1x access-user log enable to disable 802.1X user logging.

Syntax

dot1x access-user log enable [ abnormal-logoff | failed-login | ip-change | maxnum-clear-threshold | maxnum-trigger-threshold | normal-logoff | successful-login ] *

undo dot1x access-user log enable [ abnormal-logoff | failed-login | ip-change | maxnum-clear-threshold | maxnum-trigger-threshold | normal-logoff | successful-login ] *

Default

802.1X user logging is disabled.

Views

System view

Predefined user roles

network-admin

Parameters

abnormal-logoff: Logs exceptional logoffs of 802.1X users, such as logoffs caused by real-time accounting failures or reauthentication failures.

failed-login: Logs 802.1X user login failures.

ip-change: Logs 802.1X user IP changes.

maxnum-clear-threshold: Logs alarm clear threshold reaching for 802.1X user access ratio.

maxnum-trigger-threshold: Logs alarm threshold reaching for 802.1X user access ratio.

normal-logoff: Logs logoffs requested by 802.1X users.

successful-login: Logs successful 802.1X user logins.

Usage guidelines

To prevent excessive 802.1X user log entries, use this feature only if you need to analyze abnormal 802.1X user logins or logouts.

If you do not specify any parameters, this command enables all types of 802.1X user logs.

Examples

# Enable logging 802.1X user login failures.

<Sysname> system-view

[Sysname] dot1x access-user log enable failed-login

Related commands

info-center source dot1x logfile deny (Network Management and Monitoring Command Reference)

dot1x after-mac-auth max-attempt

Use dot1x after-mac-auth max-attempt to set the maximum number of 802.1X authentication attempts for MAC authenticated users on a port.

Use undo dot1x after-mac-auth max-attempt to restore the default.

Syntax

dot1x after-mac-auth max-attempt max-attempts

undo dot1x after-mac-auth max-attempt

Default

The number of 802.1X authentication attempts for MAC authenticated users is not limited on a port.

Views

Layer 2 Ethernet interface view

Predefined user roles

network-admin

Parameters

max-attempts: Specifies a number in the range of 1 to 50.

Usage guidelines

The device denies 802.1X authentication requests of a MAC authenticated user after the maximum number of 802.1X authentication attempts has been made.

The device will recount the number of 802.1X authentication attempts made by a MAC authenticated user if a user logoff or device reboot event occurs.

Examples

# Configure GigabitEthernet 1/0/1 to allow a maximum of 10 802.1X authentication attempts made by a MAC authenticated user.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x after-mac-auth max-attempt 10

Related commands

display dot1x

dot1x authentication-method

Use dot1x authentication-method to specify an EAP message handling method.

Use undo dot1x authentication-method to restore the default.

Syntax

dot1x authentication-method { chap | eap | pap }

undo dot1x authentication-method

Default

The access device performs EAP termination and uses CHAP to communicate with the RADIUS server.

Views

System view

Predefined user roles

network-admin

Parameters

chap: Configures the access device to perform Extensible Authentication Protocol (EAP) termination and use the Challenge Handshake Authentication Protocol (CHAP) to communicate with the RADIUS server.

eap: Configures the access device to relay EAP packets, and supports any of the EAP authentication methods to communicate with the RADIUS server.

pap: Configures the access device to perform EAP termination and use the Password Authentication Protocol (PAP) to communicate with the RADIUS server.

Usage guidelines

The access device terminates or relays EAP packets.

·     In EAP termination mode—The access device re-encapsulates and sends the authentication data from the client in standard RADIUS packets to the RADIUS server. The device performs either CHAP or PAP authentication with the RADIUS server. In this mode, the RADIUS server supports only MD5-Challenge EAP authentication and the username and password EAP authentication initiated by an iNode client.

¡     PAP transports usernames and passwords in plain text. The authentication method applies to scenarios that do not require high security. To use PAP, the client can be an iNode 802.1X client.

¡     CHAP transports usernames in plain text and passwords in encrypted form over the network. CHAP is more secure than PAP.

·     In EAP relay mode—The access device relays EAP messages between the client and the RADIUS server. The EAP relay mode supports multiple EAP authentication methods, such as MD5-Challenge, EAP-TLS, and PEAP. To use this mode, make sure the RADIUS server meets the following requirements:

¡     Supports the EAP-Message and Message-Authenticator attributes.

¡     Uses the same EAP authentication method as the client.

If this mode is used, the user-name-format command configured in RADIUS scheme view does not take effect. For more information about the user-name-format command, see "RADIUS commands."

If RADIUS authentication is used, you must configure the access device to use the same authentication method (PAP, CHAP, or EAP) as the RADIUS server.

Examples

# Enable the access device to terminate EAP packets and perform PAP authentication with the RADIUS server.

<Sysname> system-view

[Sysname] dot1x authentication-method pap

Related commands

display dot1x

dot1x auth-fail eapol

Use dot1x auth-fail eapol to enable the device to send an EAP-Success packet to a client when the client user is assigned to the 802.1X Auth-Fail VLAN on a port.

Use undo dot1x auth-fail eapol to restore the default.

Syntax

dot1x auth-fail eapol

undo dot1x auth-fail eapol

Default

The device sends an EAP-Failure packet to a client when the client user is assigned to the 802.1X Auth-Fail VLAN on a port.

Views

Layer 2 Ethernet interface view

Predefined user roles

network-admin

Usage guidelines

Some 802.1X clients cannot send DHCP requests for IP addresses after they receive EAP-Failure packets. To have these clients obtain IP addresses to access authorized resources after they are assigned to the 802.1X Auth-Fail VLAN, use this feature.

Examples

# Enable the device to send an EAP-Success packet to a client when the client user is assigned to the 802.1X Auth-Fail VLAN on GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x auth-fail eapol

Related commands

dot1x auth-fail vlan

dot1x auth-fail vlan

Use dot1x auth-fail vlan to configure an 802.1X Auth-Fail VLAN on a port.

Use undo dot1x auth-fail vlan to restore the default.

Syntax

dot1x auth-fail vlan authfail-vlan-id

undo dot1x auth-fail vlan

Default

No 802.1X Auth-Fail VLAN exists on a port.

Views

Layer 2 Ethernet interface view

802.1X access profile view

Predefined user roles

network-admin

Parameters

authfail-vlan-id: Specifies the ID of the 802.1X Auth-Fail VLAN on the port. The value range for the VLAN ID is 1 to 4094. Make sure the VLAN has been created. If the port type is hybrid, verify that the VLAN to be specified as the Auth-Fail VLAN is not in the tagged VLAN list on the port.

Usage guidelines

An 802.1X Auth-Fail VLAN accommodates users that have failed 802.1X authentication for any reason other than unreachable servers. Users in the Auth-Fail VLAN can access a limited set of network resources.

To delete a VLAN that has been configured as an 802.1X Auth-Fail VLAN, you must first use the undo dot1x auth-fail vlan command.

Examples

# Configure VLAN 100 as the Auth-Fail VLAN on GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x auth-fail vlan 100

Related commands

display dot1x

dot1x auth-server-unavailable escape

Use dot1x auth-server-unavailable escape to enable online 802.1X users to escape offline detection and stay online when no reachable RADIUS authentication servers are available.

Use undo dot1x auth-server-unavailable escape to disable online 802.1X users from escaping from offline detection when no reachable RADIUS authentication servers are available.

Syntax

dot1x auth-server-unavailable escape

undo dot1x auth-server-unavailable escape

Default

Online 802.1X users cannot escape offline detection (if enabled) to maintain its online status when no reachable RADIUS authentication servers are available.

Views

Layer 2 Ethernet interface view

Predefined user roles

network-admin

Usage guidelines

The 802.1X offline detection feature logs off an online 802.1X user if it has not detected traffic from that user before the offline-detect timer expires. To prevent online 802.1X users on a port from being forced offline by the 802.1X offline detection feature and stay online when none of the RADIUS servers in their ISP domain is reachable, use this command.

Use this feature only when RADIUS scheme authentication is configured for the 802.1X users on a port. If local or no authentication is also configured, offline detection might be undesirably disabled for the 802.1X users when they come online through local authentication or without authentication.

Examples

# Enable the online 802.1X users on port GigabitEthernet 1/0/1 to escape from offline detection and stay online when no reachable RADIUS servers are available.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x auth-server-unavailable escape

Related commands

dot1x offline-detect enable

dot1x critical eapol

Use dot1x critical eapol to enable the sending of an EAP-Success packet to a client when the 802.1X client user is assigned to the 802.1X critical VLAN on a port.

Use undo dot1x critical eapol to restore the default.

Syntax

dot1x critical eapol

undo dot1x critical eapol

Default

The device sends an EAP-Failure packet to a client when the 802.1X client user is assigned to the 802.1X critical VLAN on a port.

Views

Layer 2 Ethernet interface view

Predefined user roles

network-admin

 Usage guidelines

By default, the device sends EAP-Failure packets to 802.1X clients when the client users are assigned to the 802.1X critical VLAN. Some 802.1X clients, for example, Windows built-in 802.1X clients, cannot respond to the EAP-Request/Identity packets from the device for reauthentication if they have received an EAP-Failure packet. As a result, reauthentication for these clients will fail after the authentication server becomes reachable.

To avoid this situation, enable the device to send EAP-Success packets instead of EAP-Failure packets to 802.1X clients when the client users are assigned to the 802.1X critical VLAN.

Examples

# Send an EAP-Success packet to a client when the 802.1X client user is assigned to the 802.1X critical VLAN on GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x critical eapol

Related commands

dot1x critical vlan

dot1x critical vlan

Use dot1x critical vlan to configure an 802.1X critical VLAN on a port.

Use undo dot1x critical vlan to restore the default.

Syntax

dot1x critical vlan critical-vlan-id

undo dot1x critical vlan

Default

No 802.1X critical VLAN exists on a port.

Views

Layer 2 Ethernet interface view

802.1X access profile view

Predefined user roles

network-admin

Parameters

critical-vlan-id: Specifies the ID of the 802.1X critical VLAN on the port. The value range for the VLAN ID is 1 to 4094. Make sure the VLAN has been created. If the port type is hybrid, verify that the VLAN to be specified as the critical VLAN is not in the tagged VLAN list on the port.

Usage guidelines

An 802.1X critical VLAN accommodates users that fail 802.1X authentication because all the RADIUS servers in their ISP domains are unreachable. Users in the critical VLAN can access a limited set of network resources depending on the configuration.

To delete a VLAN that has been configured as an 802.1X critical VLAN, you must first use the undo dot1x critical vlan command.

Examples

# Specify VLAN 100 as the 802.1X critical VLAN on GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x critical vlan 100

Related commands

display dot1x

dot1x critical-voice-vlan

Use dot1x critical-voice-vlan to enable the 802.1X critical voice VLAN feature on a port.

Use undo dot1x critical-voice-vlan to restore the default.

Syntax

dot1x critical-voice-vlan

undo dot1x critical-voice-vlan

Default

The 802.1X critical voice VLAN feature is disabled on a port.

Views

Layer 2 Ethernet interface view

Predefined user roles

network-admin

Usage guidelines

The 802.1X critical voice VLAN on a port accommodates 802.1X voice users that have failed authentication because none of the RADIUS servers in their ISP domain are reachable.

Before you enable the 802.1X critical voice VLAN feature on the port, make sure the following requirements are met:

·     The port is configured with the voice VLAN.

To configure a voice VLAN on a port, use the voice-vlan enable command (see Layer 2—LAN Switching Command Reference).

·     LLDP is enabled both globally and on the port.

The device uses LLDP to identify voice users. For information about LLDP commands, see Layer 2—LAN Switching Command Reference.

·     An 802.1X critical VLAN is configured on the port. This setting ensures that a voice user is assigned to the critical VLAN if it has failed authentication for unreachability of RADIUS servers before the device recognizes it as a voice user. If an 802.1X critical VLAN is not available, the voice user might be logged off instead.

Examples

# Enable the 802.1X critical voice VLAN feature on GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x critical-voice-vlan

Related commands

display dot1x

lldp enable (Layer 2—LAN Switching Command Reference)

lldp global enable (Layer 2—LAN Switching Command Reference)

voice-vlan enable (Layer 2—LAN Switching Command Reference)

dot1x domain-delimiter

Use dot1x domain-delimiter to specify a set of domain name delimiters supported by the device.

Use undo dot1x domain-delimiter to restore the default.

Syntax

dot1x domain-delimiter string

undo dot1x domain-delimiter

Default

The device supports only the at sign (@) delimiter for 802.1X users.

Views

System view

Predefined user roles

network-admin

Parameters

string: Specifies a set of 1 to 16 domain name delimiters for 802.1X users. No space is required between delimiters. Available delimiters include the at sign (@), backslash (\), dot (.), and forward slash (/). If you want to use backslash (\) as the domain name delimiter, you must enter the escape character (\) along with the backslash (\) sign.

Usage guidelines

Any character in the configured set can be used as the domain name delimiter for 802.1X authentication users. Usernames that include domain names can use the format of username@domain-name, domain-name\username, username.domain-name, or username/domain-name.

The delimiter set you configured overrides the default setting. If the at sign (@) is not included in the delimiter set, the device does not support the 802.1X users that use this sign as the domain name delimiter.

If a username string contains multiple configured delimiters, the device takes the rightmost delimiter in the username string as the domain name delimiter. For example, if you configure the forward slash (/), dot (.), and backslash (\) as delimiters, the domain name delimiter for the username string 121.123/22\@abc is the backslash (\). The username is @abc and the domain name is 121.123/22.

Examples

# Specify the at sign (@) and forward slash (/) as domain name delimiters.

<Sysname> system-view

[Sysname] dot1x domain-delimiter @/

Related commands

display dot1x

dot1x duplicate-eapol-start discard

Use dot1x duplicate-eapol-start discard to discard duplicate EAPOL-Start requests on an interface.

Use undo dot1x duplicate-eapol-start discard to restore the default.

Syntax

dot1x duplicate-eapol-start discard

undo dot1x duplicate-eapol-start discard

Default

The device does not discard duplicate EAPOL-Start requests on an interface if the requests are legal.

Views

Layer 2 Ethernet interface view

Predefined user roles

network-admin

Usage guidelines

During 802.1X authentication, the device might receive duplicate EAPOL-Start requests from an 802.1X user. By default, the device delivers the duplicate EAPOL-Start requests to the authentication server as long as they are legal. However, this mechanism might result in authentication failure if the authentication server cannot respond to duplicate EAPOL-Start requests. To resolve this issue, use this command on the user access interface to discard duplicate EAPOL-Start requests.

As a best practice, use this command only if the server cannot respond to duplicate EAPOL-Start requests. Do not use this command in other situations.

Examples

# Discard duplicate EAPOL-Start requests on GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x duplicate-eapol-start discard

Related commands

display dot1x

dot1x ead-assistant enable

Use dot1x ead-assistant enable to enable the EAD assistant feature.

Use undo dot1x ead-assistant enable to disable the EAD assistant feature.

Syntax

dot1x ead-assistant enable

undo dot1x ead-assistant enable

Default

The EAD assistant feature is disabled.

Views

System view

Predefined user roles

network-admin

Usage guidelines

The EAD assistant feature enables the access device to redirect the HTTP or HTTPS requests of a user to a URL to download and install EAD client. This feature eliminates the tedious job of the administrator to deploy EAD clients.

For the EAD assistant feature to take effect on a port, you must set the port authorization mode to auto.

If you enable EAD assistant in conjunction with port security, EAD assistant cannot take effect on ports operating in autoLearn port security mode.

When you use both EAD assistant and MAC authentication on the device, follow these restrictions and guidelines:

·     If both EAD assistant and MAC authentication are configured, the device does not mark the MAC address of a user that has failed MAC authentication as a silent MAC address. If the user has never passed MAC authentication, packets from the user can trigger MAC authentication again only after the user's EAD entry ages out.

·     As a best practice, do not configure MAC authentication guest VLANs or critical VLANs. The VLANs might fail to work correctly when both EAD assistant and MAC authentication are configured on the device.

·     As a best practice, do not configure the Web authentication or IP source guard feature. These features might fail to work correctly when both EAD assistant and MAC authentication are configured on the device.

·     If the MAC address of a user has been marked as a silent MAC address before you enable EAD assistant, packets from the user can trigger 802.1X or MAC authentication only after the quiet timer expires.

If you configure both EAD assistant and 802.1X unicast trigger on a port that performs port-based access control, 802.1X unicast trigger cannot take effect.

To redirect the HTTPS requests of 802.1X users, you must execute the dot1x ead-assistant url command. By default, the device listens to port 6654 for HTTPS requests to be redirected. To change the redirect listening port number, see configuring HTTP redirect in Layer 3—IP Services Configuration Guide.

Examples

# Enable the EAD assistant feature.

<Sysname> system-view

[Sysname] dot1x ead-assistant enable

Related commands

display dot1x

dot1x ead-assistant free-ip

dot1x ead-assistant url

http-redirect https-port (Layer 3—IP Services Command Reference)

dot1x ead-assistant free-ip

Use dot1x ead-assistant free-ip to configure a free IP.

Use undo dot1x ead-assistant free-ip to remove the specified or all free IP addresses.

Syntax

dot1x ead-assistant free-ip ip-address { mask-address | mask-length }

undo dot1x ead-assistant free-ip { ip-address { mask-address | mask-length } | all }

Default

No free IPs exist. Users cannot access any segments before they pass 802.1X authentication.

Views

System view

Predefined user roles

network-admin

Parameters

ip-address: Specifies a freely accessible IP address segment, also called a free IP.

mask: Specifies an IP address mask.

mask-length: Specifies IP address mask length in the range of 1 to 32.

all: Removes all free IP addresses.

Usage guidelines

With EAD assistant enabled on the device, unauthenticated 802.1X users can access the network resources in the free IP segments before they pass 802.1X authentication.

Execute this command multiple times to configure multiple free IPs.

Examples

# Configure 192.168.1.1/16 as a free IP.

<Sysname> system-view

[Sysname] dot1x ead-assistant free-ip 192.168.1.1 255.255.0.0

Related commands

display dot1x

dot1x ead-assistant enable

dot1x ead-assistant url

dot1x ead-assistant permit authentication-escape

Use dot1x ead-assistant permit authentication-escape to enable support for correctly using Auth-Fail VLANs or critical VLANs when 802.1X EAD assistant is enabled.

Use undo dot1x ead-assistant permit authentication-escape to restore the default.

Syntax

dot1x ead-assistant permit authentication-escape

undo dot1x ead-assistant permit authentication-escape

Default

802.1X Auth-Fail VLANs or critical VLANs cannot function correctly when 802.1X EAD assistant is enabled.

Views

System view

Predefined user roles

network-admin

Usage guidelines

By default, the device allows 802.1X users who have not passed authentication to access certain network resources if they match EAD rules when EAD assistant is enabled. As a result, the device cannot correctly assign users to 802.1X Auth-Fail VLANs or critical VLANs after the users fail authentication.

This command enables the device to remove EAD entries for users who have failed authentication to ensure that the device can correctly assign the users to Auth-Fail VLANs or critical VLANs.

This command cannot take effect on ports in port-based access control.

Examples

# Enable support for correctly using Auth-Fail VLANs or critical VLANs when 802.1X EAD assistant is enabled.

<Sysname> system-view

[Sysname] dot1x ead-assistant permit authentication-escape

Related commands

dot1x ead-assistant enable

dot1x ead-assistant url

Use dot1x ead-assistant url to configure a redirect URL for EAD assistant.

Use undo dot1x ead-assistant url to restore the default.

Syntax

dot1x ead-assistant url url-string [ secondary ] [ track track-entry-number ]

undo dot1x ead-assistant url [ secondary ]

Default

No redirect URL exists for EAD assistant.

Views

System view

Predefined user roles

network-admin

Parameters

url-string: Specifies the redirect URL, a case-sensitive string of 1 to 64 characters in the format http://string or https://string. If the specified URL does not start with http:// or https://, the device prefixes the specified URL with http://. Because the URL string can contain question marks (?), you cannot obtain help information by entering a question mark at the position of this argument.

secondary: Specifies the URL as the secondary redirect URL. If you do not specify this keyword, the URL is the primary redirect URL.

track track-entry-number: Specifies a track entry by its number in the range of 1 to 1024. If you do not specify a track entry number, the specified redirect URL is not associated with a track entry.

Usage guidelines

When an unauthenticated user uses a Web browser to access any network other than the free IP, the device redirects the HTTP or HTTPS requests of the user to a redirect URL.

The redirect URLs must be on the free IP subnet.

You can specify only one primary redirect URL and one secondary redirect URL.

By default, the device listens to port 6654 for HTTPS requests to be redirected. To change the redirect listening port number, see configuring HTTP redirect in Layer 3—IP Services Configuration Guide.

You can associate a track entry with a redirect URL. The 802.1X module can determine whether the Web redirect server providing the URL is reachable, depending on the status of the track entry. If the server providing the primary redirect URL is unreachable, the device can redirect HTTP or HTTPS requests to the secondary redirect URL.

As a best practice, configure the track entry associated with a redirect URL to collaborate with an HTTP NQA operation. The redirect URL-Track-NQA collaboration can detect the connectivity of the Web redirect server and server performance. For more information about Track, see High Availability Configuration Guide. For more information about NQA, see Network Management and Monitoring Configuration Guide.

The device selects a redirect URL as follows:

·     If both the primary and secondary redirect URLs are configured and the URLs are not associated with track entries, the primary redirect URL takes precedence over the secondary redirect URL.

·     If only the primary or secondary redirect URL is configured and the URL is not associated with a track entry, the redirect URL takes effect.

·     The primary redirect URL takes effect if it is not associated with a track entry or the track entry associated with the URL is in Positive or NotReady state. If the primary redirect URL is not available, the secondary redirect URL takes effect.

·     If the primary redirect URL is not configured or the state of the track entry associated with the primary redirect URL changes to Negative, the device checks the secondary redirect URL.

¡     The secondary redirect URL takes effect if it is not associated with a track entry or its associated track entry is in Positive or NotReady state.

¡     No redirect URL is available if no secondary redirect URL is configured or the track entry associated with the secondary redirect URL is in Negative state.

Examples

# Configure the redirect URL as https://example.com.

<Sysname> system-view

[Sysname] dot1x ead-assistant url https://example.com

Related commands

display dot1x

dot1x ead-assistant enable

dot1x ead-assistant free-ip

http-redirect https-port (Layer 3—IP Services Command Reference)

dot1x eap-success post-authorization

Use dot1x eap-success post-authorization to configure the device to send EAP-Success packets to 802.1X clients after authorization for the users of the clients succeeds.

Use undo dot1x eap-success post-authorization to configure the device to send EAP-Success packets to 802.1X clients immediately after authentication for the users of the clients succeeds.

Syntax

dot1x eap-success post-authorization

undo dot1x eap-success post-authorization

Default

The device sends EAP-Success packets to 802.1X clients immediately after authentication for the users of the clients succeeds.

Views

System view

Predefined user roles

network-admin

Usage guidelines

Application scenarios

By default, the device sends an EAP-Success packet to a client after it receives a RADIUS Access-Accept packet sent by the RADIUS server for the user of that client. After that, the device grants the user access to the network through the user's access port. Upon receiving the EAP-Success packet, the client immediately initiates a DHCP request to obtain an IP address. However, if the device has not yet received authorization information assigned by the RADIUS server, the client directly obtains an IP address from its access network segment. If its access network segment is different from its authorization network segment after the RADIUS server assigns the authorization information, the client will be unable to come online.

Operating mechanism

To ensure that each 802.1X client obtains an IP address from the authorization network segment, use this feature to configure the device to send EAP-Success packets to 802.1X clients after authorization for the users of the clients succeeds.

Restrictions and guidelines

When this feature is configured, authentication for some users might fail due to untimely authorization if the RADIUS server or device needs to process a large number of authentication processes, resulting in authentication response timeout. As a best practice, use this feature based on the service processing capabilities of the device and the RADIUS server in the actual application scenario.

Examples

# Configure the device to send EAP-Success packets to 802.1X clients after authorization for the users of the clients succeeds.

<Sysname> system-view

[Sysname] dot1x eap-success post-authorization

dot1x eap-tls-fragment to-server

Use dot1x eap-tls-fragment to-server to enable 802.1X EAP-TLS fragmentation and set the maximum EAP-TLS fragment size.

Use undo dot1x eap-tls-fragment to-server to restore the default.

Syntax

dot1x eap-tls-fragment to-server eap-tls-max-length

undo dot1x eap-tls-fragment to-server

Default

EAP-TLS messages are not fragmented.

Views

System view

Predefined user roles

network-admin

Parameters

eap-tls-max-length: Sets the maximum EAP-TLS fragment size in bytes. The value range is 100 to 1500.

Usage guidelines

802.1X EAP-TLS fragmentation takes effect only when EAP relay mode is used.

When the device uses EAP-TLS authentication method in EAP relay mode, the RADIUS packets might exceed the maximum packet size supported by the RADIUS server. This situation typically occurs when long EAP-TLS messages are encapsulated in the EAP-Message attribute of the RADIUS packet sent to the RADIUS server.

To avoid authentication failures caused by oversized packets, fragment the EAP-TLS messages depending on the maximum RADIUS packet size supported by the remote RADIUS server.

For example, the maximum packet length allowed by the server is 1200 bytes and the length of a RADIUS packet (excluding the EAP-Message attribute) is 800 bytes. To make sure the maximum length of a RADIUS packet does not exceed 1200 bytes, you must set the maximum length of an EAP-TLS fragment to a value less than 400 bytes.

Examples

# Set the maximum EAP-TLS fragment size to 400 bytes.

<Sysname> system-view

[Sysname] dot1x eap-tls-fragment to-server 400

Related commands

display dot1x

dot1x authentication-method

dot1x eapol untag

Use dot1x eapol untag to enable the device to remove the VLAN tags of all 802.1X protocol packets sent out of a port to 802.1X clients.

Use undo dot1x eapol untag to restore the default.

Syntax

dot1x eapol untag

undo dot1x eapol untag

Default

Whether the device removes the VLAN tags of all 802.1X protocol packets sent out of a port to 802.1X clients depends on the configuration in the VLAN module.

Views

Layer 2 Ethernet interface view

Predefined user roles

network-admin

Usage guidelines

CAUTION

CAUTION:

This command removes the VLAN tags of all 802.1X protocol packets sent out of the port to 802.1X clients. Do not use this command if VLAN-aware 802.1X clients are attached to the port. As a best practice, use this command only in the scenario described in the command usage guidelines.

 

This command operates on a hybrid port to have it send 802.1X protocol packets with their VLAN tags removed, regardless of whether the port is a tagged or untagged member of a VLAN.

Use this command if the 802.1X-enabled hybrid port is a tagged member of its PVID and the attached 802.1X clients cannot recognize VLAN-tagged 802.1X protocol packets.

Examples

# Enable the device to remove the VLAN tags of all 802.1X protocol packets sent out of GigabitEthernet 1/0/1 to 802.1X clients.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x eapol untag

Related commands

display dot1x

dot1x guest-vlan

Use dot1x guest-vlan to configure an 802.1X guest VLAN on a port.

Use undo dot1x guest-vlan to restore the default.

Syntax

dot1x guest-vlan guest-vlan-id

undo dot1x guest-vlan

Default

No 802.1X guest VLAN exists on a port.

Views

Layer 2 Ethernet interface view

802.1X access profile view

Predefined user roles

network-admin

Parameters

guest-vlan-id: Specifies the ID of the 802.1X guest VLAN. The value range for the VLAN ID is 1 to 4094. Make sure the VLAN has been created. If the port type is hybrid, verify that the VLAN to be specified as the guest VLAN is not in the tagged VLAN list on the port.

Usage guidelines

An 802.1X guest VLAN accommodates users that have not performed 802.1X authentication. In the guest VLAN, users can access a limited set of network resources, such as a software server, to download anti-virus software and system patches.

To delete a VLAN that has been configured as a guest VLAN, you must use the undo dot1x guest-vlan command first.

Examples

# Specify VLAN 100 as the 802.1X guest VLAN on GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x guest-vlan 100

Related commands

display dot1x

dot1x guest-vlan-delay

Use dot1x guest-vlan-delay to enable 802.1X guest VLAN assignment delay on a port.

Use undo dot1x guest-vlan-delay to disable the specified 802.1X guest VLAN assignment delay on a port.

Syntax

dot1x guest-vlan-delay { eapol | new-mac }

undo dot1x guest-vlan-delay [ eapol | new-mac ]

Default

802.1X guest VLAN assignment delay is disabled on a port.

Views

Layer 2 Ethernet interface view

802.1X access profile view

Predefined user roles

network-admin

Parameters

eapol: Specifies EAPOL-triggered 802.1X guest VLAN assignment delay. This keyword takes effect if 802.1X authentication is triggered by EAPOL-Start packets.

new-mac: Specifies new MAC-triggered 802.1X guest VLAN assignment delay. This keyword takes effect if 802.1X authentication is triggered by packets from unknown MAC addresses.

Usage guidelines

This command enables the device to delay assigning an 802.1X-enabled port to the 802.1X guest VLAN when 802.1X authentication is triggered on the port.

To use this feature, the 802.1X-enabled port must perform MAC-based access control.

When 802.1X authentication is triggered on a port, the device performs the following operations:

1.     Sends a unicast EAP-Request/Identity packet to the MAC address that triggers the authentication.

2.     Retransmits the packet if no response has been received within the username request timeout interval set by using the dot1x timer tx-period command.

3.     Assigns the port to the 802.1X guest VLAN after the maximum number of request attempts set by using the dot1x retry command is reached.

If you use the undo command without any keyword, the command disables both EAPOL-triggered and new MAC-triggered 802.1X guest VLAN assignment delay on a port.

Examples

# Enable EAPOL-triggered 802.1X guest VLAN assignment delay on GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x guest-vlan-delay eapol

Related commands

display dot1x

dot1x guest-vlan

dot1x retry

dot1x timer tx-period

dot1x handshake

Use dot1x handshake to enable the online user handshake feature.

Use undo dot1x handshake to disable the online user handshake feature.

Syntax

dot1x handshake

undo dot1x handshake

Default

The online user handshake feature is enabled.

Views

Layer 2 Ethernet interface view

802.1X access profile view

Predefined user roles

network-admin

Usage guidelines

The online user handshake feature enables the device to periodically send EAP-Request/Identity packets to the client for verifying the connectivity status of online 802.1X users. The device sets a user to the offline state if it does not receive an EAP-Response/Identity packet from the user after making the maximum attempts within the handshake period. To set the handshake timer, use the dot1x timer handshake-period command. To set the maximum handshake attempts, use the dot1x retry command.

As a best practice to ensure online user handshake and new user authentication when a large number of users are present, set the following parameters to a large value:

·     Handshake timer (set by using the dot1x timer handshake-period command).

·     Maximum number of attempts to send an authentication request to a client (set by using the dot1x retry command).

Examples

# Enable the online user handshake feature on GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x handshake

Related commands

display dot1x

dot1x timer handshake-period

dot1x retry

dot1x handshake reply enable

Use dot1x handshake reply enable to enable the 802.1X online user handshake reply feature.

Use undo dot1x handshake reply enable to disable the 802.1X online user handshake reply feature.

Syntax

dot1x handshake reply enable

undo dot1x handshake reply enable

Default

The 802.1X online user handshake reply feature is disabled.

Views

Layer 2 Ethernet interface view

Predefined user roles

network-admin

Usage guidelines

This command enables the device to reply to 802.1X clients' EAP-Response/Identity packets with EAP-Success packets during the online handshake process.

Use this command only if 802.1X clients will go offline without receiving EAP-Success packets from the device.

Examples

# Enable the 802.1X online user handshake reply feature on GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x handshake reply enable

Related commands

dot1x handshake

dot1x handshake secure

Use dot1x handshake secure to enable the online user handshake security feature.

Use undo dot1x handshake secure to disable the online user handshake security feature.

Syntax

dot1x handshake secure

undo dot1x handshake secure

Default

The online user handshake security feature is disabled.

Views

Layer 2 Ethernet interface view

Predefined user roles

network-admin

Usage guidelines

The online user handshake security feature is applicable only to the network that deploys the iNode client and IMC server for 802.1X authentication. It prevents users from using illegal client software to bypass iNode security check.

To have this feature take effect, make sure the online user handshake feature is enabled.

Examples

# Enable the online user handshake security feature on GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x handshake secure

Related commands

display dot1x

dot1x handshake

port trunk permit vlan (Layer 2—LAN Switching Command Reference)

dot1x mac-binding

Use dot1x mac-binding to add an 802.1X MAC address binding entry.

Use undo dot1x mac-binding to delete the specified 802.1X MAC address binding entries.

Syntax

dot1x mac-binding mac-address

undo dot1x mac-binding { mac-address | all }

Default

No 802.1X MAC address binding entries exist on a port.

Views

Layer 2 Ethernet interface view

Predefined user roles

network-admin

Parameters

mac-address: Specifies a MAC address in the format of H-H-H, excluding broadcast, multicast, and all-zero MAC addresses.

all: Specifies all MAC addresses that are bound to a port.

Usage guidelines

This command takes effect only when the 802.1X MAC address binding feature takes effect.

802.1X MAC address binding entries, both manually added and automatically generated, never age out. They can survive a user logoff or a device reboot. To delete an entry, you must use the undo dot1x mac-binding mac-address command. An 802.1X MAC address binding entry cannot be deleted when the user in the entry is online.

After the number of 802.1X MAC address binding entries reaches the upper limit of concurrent 802.1X users (set by using the dot1x max-user command), the following restrictions exist:

·     Users not in the binding entries will fail authentication even after users in the binding entries go offline.

·     New 802.1X MAC address binding entries are not allowed.

Examples

# Add an 802.1X MAC address binding entry on GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x mac-binding 000a-eb29-75f1

Related commands

dot1x

dot1x mac-binding enable

dot1x port-method

dot1x mac-binding enable

Use dot1x mac-binding enable to enable the 802.1X MAC address binding feature.

Use undo dot1x mac-binding enable to disable the 802.1X MAC address binding feature.

Syntax

dot1x mac-binding enable

undo dot1x mac-binding enable

Default

The 802.1X MAC address binding feature is disabled.

Views

Layer 2 Ethernet interface view

Predefined user roles

network-admin

Usage guidelines

This command takes effect only on a port that performs MAC-based access control.

The 802.1X MAC address binding feature automatically binds MAC addresses of authenticated 802.1X users to the users' access port and generates 802.1X MAC address binding entries.

802.1X MAC address binding entries, both automatically generated and manually added, never age out. They can survive a user logoff or a device reboot. To delete an entry, you must use the undo dot1x mac-binding mac-address command. An 802.1X MAC address binding entry cannot be deleted when the user in the entry is online.

After the number of 802.1X MAC address binding entries reaches the upper limit of concurrent 802.1X users (set by using the dot1x max-user command), the following restrictions exist:

·     Users not in the binding entries will fail authentication even after users in the binding entries go offline.

·     New 802.1X MAC address binding entries are not allowed.

Examples

# Enable 802.1X MAC address binding on GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x mac-binding enable

Related commands

dot1x

dot1x mac-binding

dot1x port-method

dot1x mandatory-domain

Use dot1x mandatory-domain to specify a mandatory 802.1X authentication domain on a port.

Use undo dot1x mandatory-domain to restore the default.

Syntax

dot1x mandatory-domain domain-name

undo dot1x mandatory-domain

Default

No mandatory 802.1X authentication domain is specified on a port.

Views

Layer 2 Ethernet interface view

Predefined user roles

network-admin

Parameters

domain-name: Specifies the ISP domain name, a case-insensitive string of 1 to 255 characters.

Usage guidelines

When the system authenticates an 802.1X user trying to access a port, it selects an authentication domain in the following order:

1.     Mandatory domain.

2.     ISP domain specified in the username.

3.     Default ISP domain.

Examples

# Specify my-domain as the mandatory authentication domain for 802.1X users on GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x mandatory-domain my-domain

Related commands

display dot1x

dot1x max-user

Use dot1x max-user to set the maximum number of concurrent 802.1X users on a port.

Use undo dot1x max-user to restore the default.

Syntax

dot1x max-user [ preauth-domain | auth-fail-domain ] max-number

undo dot1x max-user [ preauth-domain | auth-fail-domain ]

Default

A port allows a maximum of 4294967295 concurrent 802.1X users.

Views

Layer 2 Ethernet interface view

802.1X access profile view

Predefined user roles

network-admin

Parameters

preauth-domain: Specifies the preauthentication domain.

auth-fail-domain: Specifies the Auth-Fail domain.

max-number: Specifies the maximum number of concurrent 802.1X users on a port. The value range is 1 to 4294967295.

Usage guidelines

If you do not specify the preauth-domain or auth-fail-domain keyword, this command sets the maximum number of concurrent 802.1X users on a port for 802.1X users using all access types. The 802.1X users include 802.1X users in the preauthentication domain, Auth-Fail domain, and critical domain, and 802.1X users that have passed authentication.

Set the maximum number of concurrent 802.1X users on a port to prevent the system resources from being overused. When the maximum number is reached, the port denies subsequent 802.1X users.

Examples

# Set the maximum number of concurrent 802.1X users to 32 on GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x max-user 32

Related commands

display dot1x

dot1x max-user-alarm

Use dot1x max-user-alarm to set the alarm threshold and alarm clear threshold for 802.1X user access ratio.

Use undo dot1x max-user-alarm to restore the default.

Syntax

dot1x max-user-alarm trigger-threshold trigger-threshold clear-threshold clear-threshold

undo dot1x max-user-alarm

Default

The alarm threshold and alarm clear threshold for 802.1X user access ratio in percentage is 100 and 50, respectively.

Views

System view

Predefined user roles

network-admin

Parameters

trigger-threshold trigger-threshold: Sets the alarm threshold in percentage, in the range of 1 to 100.

clear-threshold clear-threshold: Sets the alarm clear threshold in percentage, in the range of 0 to 99. The alarm clear threshold must be lower than the alarm threshold.

Usage guidelines

The 802.1X user access ratio on an interface is the percentage of current online 802.1X users to the maximum number of concurrent 802.1X users on the interface (configured by using the dot1x max-user command).

After you use the snmp-agent trap enable dot1x command to enable SNMP notifications for 802.1X user access ratio and use the dot1x max-user-alarm command to set the alarm threshold and alarm clear threshold:

·     If the percentage of 802.1X user access ratio on an interface reaches the specified alarm threshold for the first time, or increases to the alarm threshold from a value below or equal to the alarm clear threshold, the device sends an alarm notification.

·     If the percentage of 802.1X user access ratio on the interface drops to the alarm clear threshold from a value above or equal to the alarm threshold, the device sends an alarm clear notification.

If the user access ratio on an interface has reached or exceeded the alarm threshold before SNMP notifications is enabled, the alarm is triggered in the following conditions after SNMP notifications is enabled:

·     A user comes online and the alarm threshold is exceeded.

·     A user goes offline and the alarm threshold is reached or exceeded.

As a best practice, set the alarm threshold and alarm clear threshold with a value difference of 50 or so.

Examples

# Set the alarm threshold and alarm clear threshold for 802.1X user access ratio in percentage to 90 and 40, respectively.

<Sysname> system-view

[Sysname] dot1x max-user-alarm trigger-threshold 90 clear-threshold 40

Related commands

dot1x max-user

snmp-agent trap enable dot1x

dot1x multicast-trigger

Use dot1x multicast-trigger to enable the 802.1X multicast trigger feature.

Use undo dot1x multicast-trigger to disable the 802.1X multicast trigger feature.

Syntax

dot1x multicast-trigger

undo dot1x multicast-trigger

Default

The 802.1X multicast trigger feature is disabled.

Views

Layer 2 Ethernet interface view

Predefined user roles

network-admin

Usage guidelines

The multicast trigger feature enables the device to act as the initiator. The device periodically multicasts EAP-Request/Identity packets out of a port to detect 802.1X clients and trigger authentication. You can use the dot1x timer tx-period command to set the interval for sending multicast EAP-Request/Identity packets.

As a best practice to conserve link bandwidth, disable the multicast trigger if a lot of VLANs are configured on the port.

Examples

# Enable the multicast trigger feature on GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x multicast-trigger

Related commands

display dot1x

dot1x timer tx-period

dot1x unicast-trigger

dot1x packet-detect enable

Use dot1x packet-detect enable to enable packet detection for 802.1X authentication.

Use undo dot1x packet-detect enable to restore the default.

Syntax

dot1x packet-detect enable

undo dot1x packet-detect enable

Default

Packet detection for 802.1X authentication is disabled.

Views

Layer 2 Ethernet interface view

802.1X access profile view

Predefined user roles

network-admin

Usage guidelines

Application scenarios

Packet detection for 802.1X authentication takes effect on both of the following types of users:

·     Users in preauthentication domains, authentication domains, critical domains, and Auth-Fail domains.

·     Users assigned to guest VLANs, Auth-Fail VLANs, and critical VLANs.

Operating mechanism

When packet detection for 802.1X authentication is enabled on a port, the device sends detection packets to 802.1X users connected to that port at offline detection intervals set by using the dot1x timer offline-detect command. If the device does not receive a response from a user after it has made the maximum packet transmission attempts within an offline detection interval, it logs off that user and requests the RADIUS server to stop accounting for the user.

When packet detection for 802.1X authentication and 802.1X offline detection are both enabled, the device processes an 802.1X user as follows:

·     If 802.1X offline detection determines that a user is online, the device does not send detection packets to that user.

·     If 802.1X offline detection determines that a user is offline, the device does not immediately logs off that user. Instead, the device sends a detection packet to that user. It will log off that user if it does not receive a response from that user after it has made the maximum packet transmission attempts within an offline detection interval.

Prerequisites

To ensure that the device is aware of user IP address changes, enable ARP snooping and ND snooping in conjunction with packet detection for 802.1X authentication. If you do not enable ARP snooping or ND snooping, the device is unaware of user IP address changes. As a result, the device still sends detection packets to the users' original IP addresses and falsely log off these users.

Restrictions and guidelines

The packet detection feature takes effect only when the port performs MAC-based access control. If you change the port access control mode to Port-based when the packet detection feature is enabled, the packet detection feature will no longer be effective.

Both the 802.1X packet detection and 802.1X unauthenticated user aging features can take effect on users assigned to guest VLANs or VSIs, Auth-Fail VLANs or VSIs, and critical VLANs, VSIs, or microsegments. With both features enabled, a user is forced offline if the device determines that the user is offline after packet detection or the 802.1X user entry ages out. You can configure the 802.1X unauthenticated user aging feature using the dot1x unauthenticated-user aging enable command.

Examples

# Enable packet detection for 802.1X authentication.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x packet-detect enable

Related commands

dot1x timer offline-detect

port-security packet-detect arp-source-ip factor

dot1x packet-detect retry

dot1x packet-detect retry

Use dot1x packet-detect retry to set the maximum number of attempts for sending a detection packet to an 802.1X user.

Use undo dot1x packet-detect retry to restore the default.

Syntax

dot1x packet-detect retry retries

undo dot1x packet-detect retry

Default

The device sends a detection packet to an 802.1X user for a maximum of two times.

Views

Layer 2 Ethernet interface view

802.1X access profile view

Predefined user roles

network-admin

Parameters

retries: Sets the maximum number of attempts for sending a detection packet to an 802.1X user. The value range is 1 to 10.

Usage guidelines

When packet detection for 802.1X authentication is enabled on a port, the device sends detection packets to 802.1X users connected to that port at offline detection intervals set by using the offline detection timer. If the device does not receive a response from a user after it has made the maximum packet transmission attempts within an offline detection interval, it logs off that user and requests the RADIUS server to stop accounting for the user.

If the device fails to send a detection packet to an 802.1X user because it does not obtain the IP address of that user when that user just comes online, the device still decreases the maximum packet transmission attempts by 1. To prevent an 802.1X user from being logged off because the device does not obtain the IP address of that user when that user just comes online, the device increases the maximum number of packet transmission attempts by 10 on the basis of the original configuration.

Examples

# Set the maximum number of attempts to 8 for sending a detection packet to an 802.1X user.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x packet-detect retry 8

Related commands

dot1x packet-detect enable

dot1x port-control

Use dot1x port-control to set the authorization state for the port.

Use undo dot1x port-control to restore the default.

Syntax

dot1x port-control { authorized-force | auto | unauthorized-force }

undo dot1x port-control

Default

The default port authorization state is auto.

Views

Layer 2 Ethernet interface view

Predefined user roles

network-admin

Parameters

authorized-force: Places the port in authorized state, enabling users on the port to access the network without authentication.

auto: Places the port initially in unauthorized state to allow only EAPOL packets to pass, and places the port in authorized state after a user passes authentication. You can use this option in most scenarios.

unauthorized-force: Places the port in unauthorized state, denying any access requests from users on the port.

Usage guidelines

You can use this command to set the port authorization state to determine whether a client is granted access to the network.

Examples

# Set the authorization state of GigabitEthernet 1/0/1 to unauthorized-force.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x port-control unauthorized-force

Related commands

display dot1x

dot1x port-method

Use dot1x port-method to specify an access control method for the port.

Use undo dot1x port-method to restore the default.

Syntax

dot1x port-method { macbased | portbased }

undo dot1x port-method

Default

MAC-based access control applies.

Views

Layer 2 Ethernet interface view

Predefined user roles

network-admin

Parameters

macbased: Uses MAC-based access control on the port to separately authenticate each user attempting to access the network. Using this method, when an authenticated user logs off, no other online users are affected.

portbased: Uses port-based access control on the port. Using this method, once an 802.1X user passes authentication on the port, any subsequent user can access the network through the port without authentication. When the authenticated user logs off, all other users are logged off.

Usage guidelines

If online 802.1X users are present on a port, changing its access control method will cause the online users to go offline.

To avoid authentication anomalies, do not execute the dot1x port-method portbased command on an interface that is bound to a port security authentication profile.

To avoid configuration conflicts, do not configure port-based access control in conjunction with MAC address authentication, Web authentication, or static user authentication.

Examples

# Configure GigabitEthernet 1/0/1 to implement port-based access control.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x port-method portbased

Related commands

display dot1x

dot1x quiet-period

Use dot1x quiet-period to enable the quiet timer.

Use undo dot1x quiet-period to disable the quiet timer.

Syntax

dot1x quiet-period

undo dot1x quiet-period

Default

The quiet timer is disabled.

Views

System view

Predefined user roles

network-admin

Usage guidelines

When a client fails 802.1X authentication, the device must wait a period of time before it can process authentication requests from the client. You can use the dot1x timer quiet-period command to set the quiet timer.

Examples

# Enable the quiet timer and set the quiet timer to 100 seconds.

<Sysname> system-view

[Sysname] dot1x quiet-period

[Sysname] dot1x timer quiet-period 100

Related commands

display dot1x

dot1x timer

dot1x re-authenticate

Use dot1x re-authenticate to enable the 802.1X periodic reauthentication feature.

Use undo dot1x re-authenticate to disable the 802.1X periodic reauthentication feature.

Syntax

dot1x re-authenticate

undo dot1x re-authenticate

Default

The 802.1X periodic reauthentication feature is disabled.

Views

Layer 2 Ethernet interface view

Predefined user roles

network-admin

Usage guidelines

Periodic reauthentication enables the access device to periodically authenticate online 802.1X users on a port. This feature tracks the connection status of online users and updates the authorization attributes assigned by the server, such as the ACL and VLAN.

You can use the dot1x timer reauth-period command to configure the interval for reauthentication.

If periodic reauthentication is triggered for a user while that user is waiting for online synchronization, the system performs online synchronization and does not perform reauthentication for the user.

Examples

# Enable the 802.1X periodic reauthentication feature on GigabitEthernet 1/0/1, and set the periodic reauthentication interval to 1800 seconds.

<Sysname> system-view

[Sysname] dot1x timer reauth-period 1800

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x re-authenticate

Related commands

display dot1x

dot1x server-recovery online-user-sync

dot1x timer

dot1x re-authenticate manual

Use dot1x re-authenticate manual to manually reauthenticate all online 802.1X users on a port.

Syntax

dot1x re-authenticate manual

Views

Layer 2 Ethernet interface view

Predefined user roles

network-admin

Usage guidelines

After this command is executed, this device reauthenticates all online 802.1X users on a port. The command takes effect regardless of the server-assigned reauthentication attribute and the periodic reauthentication feature.

Examples

# Manually reauthenticate all online 802.1X users on GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x re-authenticate manual

Related commands

dot1x re-authenticate

dot1x re-authenticate server-unreachable keep-online

Use dot1x re-authenticate server-unreachable keep-online to enable the keep-online feature on a port.

Use undo dot1x re-authenticate server-unreachable to restore the default.

Syntax

dot1x re-authenticate server-unreachable keep-online

undo dot1x re-authenticate server-unreachable

Default

The keep-online feature is disabled on a port. The device logs off online 802.1X authenticated users if no server is reachable for 802.1X reauthentication.

Views

Layer 2 Ethernet interface view

Predefined user roles

network-admin

Usage guidelines

This feature keeps authenticated 802.1X users online when no server is reachable for 802.1X reauthentication.

Examples

# Enable the keep-online feature on GigabitEthernet 1/0/1 for 802.1X reauthentication.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x re-authenticate server-unreachable keep-online

Related commands

display dot1x

dot1x re-authenticate

dot1x retry

Use dot1x retry to set the maximum number of attempts for sending an authentication request to a client.

Use undo dot1x retry to restore the default.

Syntax

dot1x retry retries

undo dot1x retry

Default

A maximum of two attempts are made to send an authentication request to a client.

Views

System view

Predefined user roles

network-admin

Parameters

retries: Specifies the maximum number of attempts for sending an authentication request to a client. The value range is 1 to 10.

Usage guidelines

The access device retransmits an authentication request to a client in any of the following situations:

·     The device does not receive any responses from the client within the username request timeout interval. The timer is set by using the dot1x timer tx-period tx-period-value command for the EAP-Request/Identity packet.

·     The device does not receive any responses from the client within the client timeout interval. The timer is set by using the dot1x timer supp-timeout supp-timeout-value command for the EAP-Request/MD5-Challenge packet.

The access device stops retransmitting the request, if it has made the maximum number of request transmission attempts but still received no response.

Examples

# Set the maximum number of attempts to 9 for sending an authentication request to a client.

<Sysname> system-view

[Sysname] dot1x retry 9

Related commands

display dot1x

dot1x timer

dot1x server-recovery online-user-sync

Use dot1x server-recovery online-user-sync to enable 802.1X online user synchronization.

Use undo dot1x server-recovery online-user-sync to disable 802.1X online user synchronization.

Syntax

dot1x server-recovery online-user-sync

undo dot1x server-recovery online-user-sync

Default

802.1X online user synchronization is disabled. The device does not synchronize online 802.1X user information on a port with a RADIUS server after the RADIUS server recovers from the unreachable state.

Views

Layer 2 Ethernet interface view

Predefined user roles

network-admin

Usage guidelines

IMPORTANT

IMPORTANT:

This command takes effect only when the device uses an IMC RADIUS server to authenticate 802.1X users.

To ensure that the RADIUS server maintains the same online 802.1X user information as the device after the server state changes from unreachable to reachable, use this feature.

This feature synchronizes online 802.1X user information between the device and the RADIUS server when the RADIUS server state is detected having changed from unreachable to reachable.

When synchronizing online 802.1X user information on a port with the RADIUS server, the device initiates 802.1X authentication in turn for each authenticated online 802.1X user to the RADIUS server.

If synchronization fails for an online user, the device logs off that user unless the failure occurs because the server has become unreachable again.

The amount of time required to complete online user synchronization increases as the number of online users grows. This might result in an increased delay for new 802.1X users and users in the critical VLAN to authenticate or reauthenticate to the RADIUS server and come online.

To have this feature take effect, you must use it in conjunction with the RADIUS server status detection feature, which is configurable with the radius-server test-profile command. When you configure this feature, make sure the detection interval is shorter than the RADIUS server quiet timer configured by using the timer quiet command in RADIUS scheme view. The server state changes to active on expiration of the quiet timer regardless of its actual reachability. Setting a shorter detection interval than the quiet timer prevents the RADIUS server status detection feature from falsely reporting the server reachability.

For more information about the RADIUS server status detection feature, see AAA configuration in Security Configuration Guide.

Examples

# Enable 802.1X online user synchronization on GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x server-recovery online-user-sync

Related commands

display dot1x

radius-server test-profile

timer quiet (RADIUS scheme view)

dot1x timer

Use dot1x timer to set an 802.1X timer.

Use undo dot1x timer to restore the default of an 802.1X timer.

Syntax

dot1x timer { ead-timeout ead-timeout-value | handshake-period handshake-period-value | quiet-period quiet-period-value | reauth-period reauth-period-value | server-timeout server-timeout-value | supp-timeout supp-timeout-value | tx-period tx-period-value | unicast-trigger quiet-period quiet-period-value | user-aging { auth-fail-vlan | critical-vlan | guest-vlan } aging-time-value }

undo dot1x timer { ead-timeout | handshake-period | quiet-period | reauth-period | server-timeout | supp-timeout | tx-period | unicast-trigger quiet-period | user-aging { auth-fail-vlan | critical-vlan | guest-vlan } }

Default

The following 802.1X timers apply:

·     EAD rule timer: 30 minutes.

·     Handshake timer: 15 seconds.

·     Quiet timer: 60 seconds.

·     Periodic reauthentication timer: 3600 seconds.

·     Server timeout timer: 100 seconds.

·     Client timeout timer: 30 seconds.

·     Username request timeout timer: 30 seconds.

·     Unicast-trigger quiet timer: 0 seconds. The unicast-trigger quiet timer is disabled.

·     User aging timers for all applicable types of 802.1X VLANs: 1000 seconds.

Views

System view

Predefined user roles

network-admin

Parameters

ead-timeout ead-timeout-value: Sets the EAD rule timer in minutes. The value range for the ead-timeout-value argument is 1 to 1440.

handshake-period handshake-period-value: Sets the handshake timer in seconds. The value range for the handshake-period-value argument is 5 to 1024.

quiet-period quiet-period-value: Sets the quiet timer in seconds. The value range for the quiet-period-value argument is 10 to 120.

reauth-period reauth-period-value: Sets the periodic reauthentication timer in seconds. The value range for the reauth-period-value argument is 60 to 86400.

server-timeout server-timeout-value: Sets the server timeout timer in seconds. The value range for the server-timeout-value argument is 100 to 300.

supp-timeout supp-timeout-value: Sets the client timeout timer in seconds. The value range for the supp-timeout-value argument is 1 to 120.

tx-period tx-period-value: Sets the username request timeout timer, in seconds. The value range for the tx-period-value argument is 1 to 120.

unicast-trigger quiet-period quiet-period-value: Sets the unicast-trigger quiet timer, in seconds. The vaue range for the quiet-period-value argument is 0 to 3600. The default timer value is 0, which indicates that the unicast-trigger timer is not enabled.

user-aging: Sets the user aging timer for a type of 802.1X VLAN.

auth-fail-vlan: Specifies 802.1X Auth-Fail VLANs.

critical-vlan: Specifies 802.1X critical VLANs.

guest-vlan: Specifies 802.1X guest VLANs.

aging-time-value: Sets the user aging timer. The value range is 60 to 2147483647 seconds.

Usage guidelines

In most cases, the default settings are sufficient. You can edit the timers, depending on the network conditions.

·     In a low-speed network, increase the client timeout timer.

·     In a vulnerable network, set the quiet timer to a high value.

·     In a high-performance network with quick authentication response, set the quiet timer to a low value.

·     In a network with authentication servers of different performance, adjust the server timeout timer.

The network device uses the following 802.1X timers:

·     EAD rule timer (ead-timeout)—Sets the lifetime of each EAD rule. When the timer expires or the user passes authentication, the rule is removed. If users fail to download the EAD client or fail to pass authentication before the timer expires, they must reconnect to the network to access the free IP.

·     Handshake timer (handshake-period)—Sets the interval at which the access device sends client handshake requests to check the online status of a client that has passed authentication. If the device does not receive a response after sending the maximum number of handshake requests, it considers that the client has logged off.

·     Quiet timer (quiet-period)—Starts when a client fails authentication. The access device must wait the time period before it can process the authentication attempts from the client.

·     Periodic reauthentication timer (reauth-period)—Sets the interval at which the network device periodically reauthenticates online 802.1X users. To enable 802.1X periodic reauthentication on a port, use the dot1x re-authenticate command.

·     Server timeout timer (server-timeout)—Starts when the access device sends a RADIUS Access-Request packet to the authentication server. If no response is received when this timer expires, the 802.1X authentication fails.

To avoid forced logoff before the server timeout timer expires, set the server timeout timer to a value that is lower than or equal to the product of the following values:

¡     The maximum number of RADIUS packet transmission attempts set by using the retry command in RADIUS scheme view.

¡     The RADIUS server response timeout timer set by using the timer response-timeout command in RADIUS scheme view.

For information about setting the maximum number of RADIUS packet transmission attempts and the RADIUS server response timeout timer, see AAA configuration in Security Configuration Guide.

·     Client timeout timer (supp-timeout)—Starts when the access device sends an EAP-Request/MD5-Challenge packet to a client. If no response is received when this timer expires, the access device retransmits the request to the client.

·     Username request timeout timer (tx-period)—Starts when the device sends an EAP-Request/Identity packet to a client in response to an authentication request. If the device does not receive a response before this timer expires, it retransmits the request. The timer also sets the interval at which the network device sends multicast EAP-Request/Identity packets to detect clients that cannot actively request authentication.

·     Unicast-trigger quiet timer (unicast-trigger quiet-period)—Sets the duration that the unicast trigger is suppressed from sending EAP-Request/Identity requests to an unknown MAC address. This timer starts when the device fails to receive a response from an unknown MAC address after the number of unicast EAP-Request/Identity requests sent to that MAC address has reached the limit. The limit is configurable with the dot1x retry command.

·     User aging timer (user-aging)—Sets the user aging timer for a type of 802.1X VLAN when 802.1X unauthenticated user aging is enabled.

You can set a user aging timer for Auth-Fail, critical, or guest VLANs. The user aging timer for a type of 802.1X VLAN determines how long a user can stay in that type of VLAN.

For more information about how user aging operates, see the usage guidelines for the dot1x unauthenticated-user aging enable command.

Do not set a user aging timer to a multiple of the username request timeout timer (the dot1x timer tx-period command). If you do so, the aging timer will not take effect.

The change to the periodic reauthentication timer applies to the users that have been online only after the old timer expires. Other timer changes take effect immediately on the device.

The network access delay introduced by the unicast-trigger quiet timer increases as the timer value increases. When you set the unicast-trigger quiet timer, make sure its value does not introduce undesired delay for 802.1X authentication users to come online.

Examples

# Set the server timeout timer to 150 seconds.

<Sysname> system-view

[Sysname] dot1x timer server-timeout 150

Related commands

display dot1x

dot1x unauthenticated-user aging enable

retry

timer response-timeout (RADIUS scheme view)

dot1x timer reauth-period

Use dot1x timer reauth-period to set the 802.1X periodic reauthentication timer on a port.

Use undo dot1x timer reauth-period to restore the default.

Syntax

dot1x timer reauth-period reauth-period-value

undo dot1x timer reauth-period

Default

No 802.1X periodic reauthentication timer is configured on a port. The port uses the global 802.1X periodic reauthentication timer.

Views

Layer 2 Ethernet interface view

Predefined user roles

network-admin

Parameters

reauth-period-value: Sets the 802.1X periodic reauthentication timer in seconds. The value range for the reauth-period-value argument is 60 to 86400.

Usage guidelines

The device reauthenticates online 802.1X users on a port at the specified periodic reauthentication interval when the port is enabled with periodic reauthentication. To enable periodic reauthentication on a port, use the dot1x re-authenticate command.

A change to the periodic reauthentication timer applies to online users only after the old timer expires.

The device selects a periodic reauthentication timer for 802.1X reauthentication in the following order:

1.     Server-assigned reauthentication timer.

2.     Port-specific reauthentication timer.

3.     Global reauthentication timer.

4.     Default reauthentication timer.

Examples

# Set the 802.1X periodic reauthentication timer to 60 seconds on GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x timer reauth-period 60

Related commands

dot1x timer

dot1x unauthenticated-user aging enable

Use dot1x unauthenticated-user aging enable to enable 802.1X unauthenticated user aging.

Use undo dot1x unauthenticated-user aging enable to disable 802.1X unauthenticated user aging.

Syntax

dot1x unauthenticated-user aging enable

undo dot1x unauthenticated-user aging enable

Default

User aging is enabled for 802.1X users that have not been authenticated or have not passed authentication.

Views

Layer 2 Ethernet interface view

Predefined user roles

network-admin

Usage guidelines

802.1X unauthenticated user aging applies to 802.1X users that have not been authenticated or have failed authentication.

If the port uses port-based access control, the 802.1X unauthenticated user aging timer starts when the port is assigned to the critical or Auth-Fail VLAN. When the aging timer expires, the port is removed from the VLAN and all MAC address entries for users in the VLAN are also removed. To adjust the user aging timer, use the dot1x timer user-aging command.

If the port uses MAC-based access control, an 802.1X unauthenticated user aging timer starts for each 802.1X user when they are assigned to one of the following VLANs:

·     Auth-Fail VLAN.

·     Critical VLAN.

·     Guest VLAN.

When the aging timer for a user expires, the device removes that user from the VLAN. To adjust the user aging timer, use the dot1x timer user-aging command.

For users in one of those VLANs on one port to be authenticated successfully and come online on another port, enable this feature. In any other scenarios, disable this feature as a best practice.

The removed users will be unable to access any network resources until after another authentication is triggered.

Examples

# Disable 802.1X unauthenticated user aging on GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] undo dot1x unauthenticated-user aging enable

Related commands

dot1x timer

dot1x unicast-trigger

Use dot1x unicast-trigger to enable the 802.1X unicast trigger feature.

Use undo dot1x unicast-trigger to disable the 802.1X unicast trigger feature.

Syntax

dot1x unicast-trigger

undo dot1x unicast-trigger

Default

The 802.1X unicast trigger feature is enabled.

Views

Layer 2 Ethernet interface view

802.1X access profile view

Predefined user roles

network-admin

Usage guidelines

The unicast trigger feature enables the access device to initiate 802.1X authentication when the device receives a data frame from an unknown source MAC address. The device sends a unicast EAP-Request/Identity packet to the unknown source MAC address. It will retransmit the packet if it does not receive any responses within a period of time (set by using the dot1x timer tx-period command). This process continues until the maximum number of request attempts (set by using the dot1x retry command) is reached.

As a best practice, do not use the unicast trigger on a port that performs port-based access control. If you do so, users on the port might fail to come online correctly.

Examples

# Enable the unicast trigger feature on GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x unicast-trigger

Related commands

display dot1x

dot1x multicast-trigger

dot1x port-method

dot1x retry

dot1x timer

dot1x user-ip freeze

Use dot1x user-ip freeze to enable 802.1X user IP freezing.

Use undo dot1x user-ip freeze to disable 802.1X user IP freezing.

Syntax

dot1x user-ip freeze

undo dot1x user-ip freeze

Default

802.1X user IP freezing is disabled.

Views

Layer 2 Ethernet interface view

Predefined user roles

network-admin

Usage guidelines

This command prevents 802.1X-generated IPSG bindings from being updated because of user IP changes. For information about IP source guard commands, see "IP source guard commands."

Examples

# Enable 802.1X user IP freezing on GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] dot1x user-ip freeze

reset dot1x access-user

Use reset dot1x access-user to log off 802.1X users.

Syntax

reset dot1x access-user [ interface interface-type interface-number | mac mac-address | online-type { auth-fail-domain | critical-domain | preauth-domain | success } | username username | vlan vlan-id ]

Views

User view

Predefined user roles

network-admin

Parameters

interface interface-type interface-number: Specifies a port by its type and number.

mac mac-address: Specifies an 802.1X user by its MAC address. The mac-address argument is in the format of H-H-H.

online-type: Specifies a type of online 802.1X users.

·     auth-fail-domain: Specifies 802.1X users in the Auth-Fail domain.

·     critical-domain: Specifies 802.1X users in the critical domain.

·     preauth-domain: Specifies 802.1X users in the preauthentication domain.

·     success: Specifies users that have passed 802.1X authentication.

username username: Specifies an 802.1X user by its name. The username argument is a case-sensitive string of 1 to 253 characters.

vlan vlan-id: Specifies a VLAN by its VLAN ID. The value range for the vlan-id argument is 1 to 4094.

Usage guidelines

Use this command to log off the specified 802.1X users and clear information about these users from the device. These users must perform 802.1X authentication to come online again.

With a VLAN specified, this command logs off the following 802.1X users:

·     Users that have passed 802.1X authentication and have been assigned the specified VLAN as the authorization VLAN by the server.

·     Users that stay in the specified VLAN after they have passed 802.1X authentication, because they have not been assigned an authorization VLAN yet.

·     Users that are performing 802.1X authentication in the specified VLAN.

To identify the VLAN in which a user is staying, use the display mac-address command.

If you do not specify any parameters, the reset dot1x access-user command logs off all 802.1X users on the device.

Examples

# Log off all 802.1X users on GigabitEthernet 1/0/1.

<Sysname> reset dot1x access-user interface gigabitethernet 1/0/1

Related commands

display dot1x connection

reset dot1x guest-vlan

Use reset dot1x guest-vlan to remove users from the 802.1X guest VLAN on a port.

Syntax

reset dot1x guest-vlan interface interface-type interface-number [ mac-address mac-address ]

Views

User view

Predefined user roles

network-admin

Parameters

interface interface-type interface-number: Specifies a port by its type and number.

mac-address mac-address: Specifies the MAC address of an 802.1X user in the guest VLAN. If you do not specify this option, the command removes all 802.1X users from the 802.1X guest VLAN on the port.

Examples

# Remove the 802.1X user with MAC address 1-1-1 from the 802.1X guest VLAN on GigabitEthernet 1/0/1.

<Sysname> reset dot1x guest-vlan interface gigabitethernet 1/0/1 mac-address 1-1-1

Related commands

dot1x guest-vlan

reset dot1x statistics

Use reset dot1x statistics to clear 802.1X statistics.

Syntax

reset dot1x statistics [ interface interface-type interface-number ]

Views

User view

Predefined user roles

network-admin

Parameters

interface interface-type interface-number: Specifies a port by its type and number. If you do not specify a port, this command clears 802.1X statistics on all ports.

Examples

# Clear 802.1X statistics on GigabitEthernet 1/0/1.

<Sysname> reset dot1x statistics interface gigabitethernet 1/0/1

Related commands

display dot1x

reset dot1x unicast-trigger quiet-mac

Use reset dot1x unicast-trigger quiet-mac to remove the records of unknown source MAC addresses in the unicast-trigger quiet period.

Syntax

reset dot1x unicast-trigger quiet-mac [ interface interface-type interface-number ] [ mac-address mac-address ]

Views

User view

Predefined user roles

network-admin

Parameters

interface interface-type interface-number: Specifies a port by its type and number.

mac-address mac-address: Specifies a MAC address in H-H-H format.

Usage guidelines

This command removes all records of unknown source MAC addresses in the unicast-trigger quiet period if you execute it without specifying any parameters.

Examples

# Remove the records of unknown source MAC addresses in the unicast-trigger quiet period for interface GigabitEthernet 1/0/1.

<Sysname> reset dot1x unicast-trigger quiet-mac interface gigabitethernet 1/0/1

Related commands

display dot1x unicast-trigger quiet-mac

snmp-agent trap enable dot1x

Use snmp-agent trap enable dot1x to enable SNMP notifications for 802.1X.

Use undo snmp-agent trap enable dot1x to disable SNMP notifications for 802.1X.

Syntax

snmp-agent trap enable dot1x [ dot1x-not-support | resource-not-enough | unicast-not-support | user-maxnum ] *

undo snmp-agent trap enable dot1x [ dot1x-not-support | resource-not-enough | unicast-not-support | user-maxnum ] *

Default

SNMP notifications for 802.1X are disabled.

Views

System view

Predefined user roles

network-admin

Parameters

dot1x-not-support: Enables SNMP notifications for interface support for 802.1X authentication. If an interface does not support 802.1X authentication, the system generates an SNMP notification.

resource-not-enough: Enables SNMP notifications for ACL resource insufficiency.

unicast-not-support: Enables SNMP notifications for interface support for the 802.1X unicast trigger feature. If an interface does not support the 802.1X unicast trigger feature, the system generates an SNMP notification.

user-maxnum: Enables SNMP notifications for 802.1X user access ratio.

Usage guidelines

If you do not specify any parameters, this command enables all types of 802.1X SNMP notifications.

After you specify the user-maxnum keyword to enable SNMP notifications for 802.1X user access ratio and use the dot1x max-user-alarm command to set the alarm threshold and alarm clear threshold:

·     If the percentage of 802.1X user access ratio on an interface reaches the specified alarm threshold for the first time, or increases to the alarm threshold from a value below or equal to the alarm clear threshold, the device sends an alarm notification.

·     If the percentage of 802.1X user access ratio on the interface drops to the alarm clear threshold from a value above or equal to the alarm threshold, the device sends an alarm clear notification.

Examples

# Enable SNMP notifications for 802.1X user access ratio.

<Sysname> system-view

[Sysname] snmp-agent trap enable dot1x user-maxnum

Related commands

dot1x max-user

dot1x max-user-alarm

dot1x unicast-trigger

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网