07-Security Volume

HomeSupportSwitchesH3C S7500E Switch SeriesReference GuidesCommand ReferencesH3C S7500E Series Ethernet Switches Command Manual(Release 6300 series V1.03)07-Security Volume
02-802.1X Commands
Title Size Download
02-802.1X Commands 87.4 KB

802.1X Configuration Commands

display dot1x

Syntax

display dot1x [ sessions | statistics ] [ interface interface-list ]

View

Any view

Default Level

1: Monitor level

Parameters

sessions: Displays 802.1X session information.

statistics: Displays 802.1X statistics.

interface interface-list: Specifies an Ethernet port list, which can contain multiple Ethernet ports. The interface-list argument is in the format of interface-list = { interface-type interface-number [ to interface-type interface-number ] } & <1-10>, where interface-type represents the port type, interface-number represents the port number, and & <1-10> means that you can provide up to 10 port indexes/port index lists for this argument. The start port number must be smaller than the end number and the two ports must be of the same type.

Description

Use the display dot1x command to display information about 802.1X.

If you specify neither the sessions keyword nor the statistics keyword, the command displays all information about 802.1X, including session information, statistics, and configurations.

Related commands: reset dot1x statistics, dot1x, dot1x retry, dot1x max-user, dot1x port-control, dot1x port-method, dot1x timer.

Examples

# Display all information about 802.1X.

<Sysname> display dot1x

Equipment 802.1X protocol is enabled

CHAP authentication is enabled

Proxy trap checker is disabled

Proxy logoff checker is disabled

EAD quick deploy is enabled

 

Configuration: Transmit Period     30 s,  Handshake Period       15 s

               Quiet Period        60 s,  Quiet Period Timer is disabled

               Supp Timeout        30 s,  Server Timeout         100 s

               The maximal retransmitting times          3

EAD quick deploy configuration:

               URL: http://192.168.19.23

               Free IP: 192.168.19.0 255.255.255.0

               EAD timeout:    30m

 

The maximum 802.1X user resource number is 2048 per slot

Total current used 802.1X resource number is 1

 

GigabitEthernet2/0/1  is link-up

  802.1X protocol is enabled

  Proxy trap checker is disabled

  Proxy logoff checker is disabled

  Handshake is disabled

  The port is an authenticator

  Authenticate Mode is Auto

  802.1X Multicast-trigger is enabled

  Mandatory authentication domain: NOT configured

  Port Control Type is Port-based

  Guest VLAN: 4

  Max number of on-line users is 1024

 

  EAPOL Packet: Tx 1087, Rx 986

  Sent EAP Request/Identity Packets : 943

       EAP Request/Challenge Packets: 60

       EAP Success Packets: 29, Fail Packets: 55

  Received EAPOL Start Packets : 60

           EAPOL LogOff Packets: 24

           EAP Response/Identity Packets : 724

           EAP Response/Challenge Packets: 54

           Error Packets: 0

1. Authenticated user : MAC address: 0015-e9a6-7cfe

 

  Controlled User(s) amount to 1

Table 1-1 display dot1x command output description

Field

Description

Equipment 802.1X protocol is enabled

Indicates whether 802.1X is enabled

CHAP authentication is enabled

Indicates whether CHAP authentication is enabled

Proxy trap checker is disabled

Indicates whether the device is configured to send a trap packet when detecting that a user is trying to log in through a proxy

Proxy logoff checker is disabled

Indicates whether the device is configured to get users offline when they are trying to log in through a proxy

EAD quick deploy is enabled

Indicates whether EAD quick deployment is enabled

Transmit Period

Setting of the username request timeout timer

Handshake Period

Setting of the handshake timer

Quiet Period

Setting of the quiet timer

Quiet Period Timer is disabled

Indicates whether the quiet timer is enabled

Supp Timeout

Setting of the supplicant timeout timer

Server Timeout

Setting of the server timeout timer

The maximal retransmitting times

Maximum number of attempts for the authenticator to send authentication requests to the supplicant

EAD quick deploy configuration

EAD quick deployment configurations

URL

Redirect URL for IE users

Free IP

Accessible network segment

EAD timeout

EAD rule timeout time

The maximum 802.1X user resource number per slot

Maximum number of supplicants supported per board

Total current used 802.1X resource number

Total number of online users

GigabitEthernet2/0/1 is link-up

Status of port GigabitEthernet 2/0/1

802.1X protocol is disabled

Indicates whether 802.1X is enabled on the port

Proxy trap checker is disabled

Indicates whether the port is configured to send a trap packet when detecting that a user is trying to log in through a proxy

Proxy logoff checker is disabled

Indicates whether the port is configured to get users offline when they are trying to log in through a proxy

Handshake is disabled

Indicates whether handshake is enabled  on the port

The port is an authenticator

Role of the port

Authenticate Mode is Auto

Access control mode for the port

802.1X Multicast-trigger is enabled

802.1X multicast-trigger function state

Mandatory authentication domain

Mandatory authentication domain for users accessing the port

Port Control Type is Port-based

Access control method for the port

Guest VLAN

Guest VLAN configured for the port. Not configured will be displayed if no guest VLAN is configured.

Max number of on-line user

Maximum number of users supported on the port

EAPOL Packet

Number of EAPOL packets sent (Tx) or received (Rx)

Sent EAP Request/Identity Packets

Number of EAP Request/Identity packets sent

EAP Request/Challenge Packets

Number of EAP Request/Challenge packets sent

EAP Success Packets

Number of EAP Success packets sent

Received EAPOL Start Packets

Number of EAPOL Start packets received

EAPOL LogOff Packets

Number of EAPOL LogOff packets received

EAP Response/Identity Packets

Number of EAP Response/Identity packets received

EAP Response/Challenge Packets

Number of EAP Response/Challenge packets received

Error Packets

Number of erroneous packets received

Authenticated user

User that has passed the authentication

Controlled User(s) amount

Number of controlled users on the port

 

dot1x

Syntax

In system view:

dot1x [ interface interface-list ]

undo dot1x [ interface interface-list ]

In Ethernet interface view:

dot1x

undo dot1x

View

System view, interface view

Default Level

2: System level

Parameters

interface interface-list: Specifies a port list, which can contain multiple ports. The interface-list argument is in the format of interface-list = { interface-type interface-number [ to interface-type interface-number ] } & <1-10>, where interface-type represents the port type, interface-number represents the port number, and & <1-10> means that you can provide up to 10 port indexes/port index lists for this argument. The start port number must be smaller than the end number and the two ports must be of the same type.

Description

Use the dot1x command in system view to enable 802.1X globally.

Use the undo dot1x command in system view to disable 802.1X globally.

Use the dot1x interface interface-list command in system view or the dot1x command in interface view to enable 802.1X for specified ports.

Use the undo dot1x interface interface-list command in system view or the undo dot1x command in interface view to disable 802.1X for specified ports.

By default, 802.1X is neither enabled globally nor enabled for any port.

Note that:

l          802.1X must be enabled both globally in system view and for the intended ports in system view or interface view. Otherwise, it does not function.

l          You can configure 802.1X parameters either before or after enabling 802.1X.

Related commands: display dot1x.

Examples

# Enable 802.1X for ports GigabitEthernet 2/0/1, and GigabitEthernet 2/0/5 to GigabitEthernet 2/0/7.

<Sysname> system-view

[Sysname] dot1x interface GigabitEthernet 2/0/1 GigabitEthernet 2/0/5 to GigabitEthernet 2/0/7

Or

<Sysname> system-view

[Sysname] interface GigabitEthernet 2/0/1

[Sysname-GigabitEthernet2/0/1] dot1x

[Sysname-GigabitEthernet2/0/1] quit

[Sysname] interface GigabitEthernet 2/0/5

[Sysname-GigabitEthernet2/0/5] dot1x

[Sysname-GigabitEthernet2/0/5] quit

[Sysname] interface GigabitEthernet 2/0/6

[Sysname-GigabitEthernet2/0/6] dot1x

[Sysname-GigabitEthernet2/0/6] quit

[Sysname] interface GigabitEthernet 2/0/7

[Sysname-GigabitEthernet2/0/7] dot1x

# Enable 802.1X globally.

<Sysname> system-view

[Sysname] dot1x

dot1x authentication-method

Syntax

dot1x authentication-method { chap | eap | pap }

undo dot1x authentication-method

View

System view

Default Level

2: System level

Parameters

chap: Authenticates supplicants using CHAP.

eap: Authenticates supplicants using EAP.

pap: Authenticates supplicants using PAP.

Description

Use the dot1x authentication-method command to set the 802.1X authentication method.

Use the undo dot1x authentication-method command to restore the default.

By default, CHAP is used.

l          The password authentication protocol (PAP) transports passwords in clear text.

l          The challenge handshake authentication protocol (CHAP) transports only usernames over the network. Compared with PAP, CHAP provides better security.

l          With EAP relay authentication, the authenticator encapsulates 802.1X user information in the EAP attributes of RADIUS packets and sends the packets to the RADIUS server for authentication; it does not need to repackage the EAP packets into standard RADIUS packets for authentication. In this case, you can configure the user-name-format command but it does not take effect. For information about the user-name-format command, refer to AAA Commands in the Security Volume.

Note that:

l          Local authentication supports PAP and CHAP.

l          For RADIUS authentication, the RADIUS server must be configured accordingly to support PAP, CHAP, or EAP authentication.

Related commands: display dot1x.

Examples

# Set the 802.1X authentication method to PAP.

<Sysname> system-view

[Sysname] dot1x authentication-method pap

dot1x guest-vlan

Syntax

In system view:

dot1x guest-vlan vlan-id [ interface interface-list ]

undo dot1x guest-vlan [ interface interface-list ]

In interface view:

dot1x guest-vlan guest-vlan-id

undo dot1x guest-vlan

View

System view, Layer 2 Ethernet interface view

Default Level

2: System level

Parameters

guest-vlan-id: ID of the VLAN to be specified as the guest VLAN, in the range 1 to 4094. It must already exist.

interface interface-list: Specifies a port list. The interface-list argument is in the format of interface-list = { interface-type interface-number [ to interface-type interface-number ] } & <1-10>, where interface-type represents the port type, interface-number represents the port number, and & <1-10> means that you can provide up to 10 port indexes/port index lists for this argument. The start port number must be smaller than the end number and the two ports must be of the same type.

Description

Use the dot1x guest-vlan command to configure the guest VLAN for specified or all ports.

Use the undo dot1x guest-vlan command to remove the guest VLAN(s) configured for specified or all ports.

By default, a port is configured with no guest VLAN.

Note that:

l          In system view, this command configures a guest VLAN for all Layer 2 Ethernet ports if you do not specify the interface-list argument, and configures a guest VLAN for specified ports if you specify the interface-list argument.

l          In interface view, you cannot specify the interface-list argument and can only configure guest VLAN for the current port.

l          You must enable 802.1X for a guest VLAN to take effect.

l          You must enable the 802.1X multicast trigger function for a guest VLAN to take effect.

l          When the port access control method is set to portbased, you can specify a tagged VLAN as the guest VLAN of a Hybrid port, but the guest VLAN does not take effect. If the guest VLAN of a Hybrid port is in operation, you cannot configure the guest VLAN to carry VLAN tag.

l          A super VLAN cannot be set as the guest VLAN. Similarly, a guest VLAN cannot be set as the super VLAN. For information about super VLAN, refer to VLAN Configuration in the Access Volume.

l          You are not allowed to delete a VLAN that is configured as a guest VLAN. To delete such a VLAN, you need to remove the guest VLAN configuration first.

l          You cannot configure both the guest VLAN function and the free IP function on a port.

Related commands: dot1x; dot1x port-method; dot1x multicast-trigger; mac-vlan enable, and display mac-vlan in VLAN Commands in the Access Volume.

Examples

# Specify port GigabitEthernet 2/0/1 to use VLAN 999 as its guest VLAN.

<Sysname> system-view

[Sysname] dot1x guest-vlan 999 interface GigabitEthernet 2/0/1

# Specify ports GigabitEthernet 2/0/2 to GigabitEthernet 2/0/5 to use VLAN 10 as its guest VLAN.

<Sysname> system-view

[Sysname] dot1x guest-vlan 10 interface GigabitEthernet 2/0/2 to GigabitEthernet 2/0/5

# Specify all ports to use VLAN 7 as their guest VLAN.

<Sysname> system-view

[Sysname] dot1x guest-vlan 7

# Specify port GigabitEthernet 2/0/7 to use VLAN 3 as its guest VLAN.

<Sysname> system-view

[Sysname] interface GigabitEthernet 2/0/7

[Sysname-GigabitEthernet2/0/7] dot1x guest-vlan 3

dot1x handshake

Syntax

dot1x handshake

undo dot1x handshake

View

Interface view

Default Level

2: System level

Parameters

None

Description

Use the dot1x handshake command to enable the online user handshake function so that the device can periodically send handshake messages to the client to check whether a user is online.

Use the undo dot1x handshake command to disable the function.

By default, the function is enabled.

Note that:

l          The 802.1X proxy detection function depends on the online user handshake function. Be sure to enable handshake before enabling proxy detection and to disable proxy detection before disabling handshake.

l          To ensure that the online user handshake function can work normally, you are recommended to use H3C 802.1X client software.

Examples

# Enable online user handshake.

<Sysname> system-view

[Sysname] interface GigabitEthernet 2/0/4

[Sysname-GigabitEthernet2/0/4] dot1x handshake

 

dot1x mandatory-domain

Syntax

dot1x mandatory-domain domain-name

undo dot1x mandatory-domain

View

Interface view

Default Level

2: System level

Parameters

domain-name: ISP domain name, a case-insensitive string of 1 to 24 characters.

Description

Use the dot1x mandatory-domain command to specify the mandatory authentication domain for users accessing the port.

Use the undo dot1x mandatory-domain command to remove the mandatory authentication domain.

By default, no mandatory authentication domain is specified.

Note that:

l          When authenticating an 802.1X user trying to access the port, the system selects an authentication domain in the following order: the mandatory domain, the ISP domain specified in the username, and the default ISP domain.

l          The specified mandatory authentication domain must exist.

l          On a port configured with a mandatory authentication domain, the user domain name displayed by the display connection command is the name of the mandatory authentication domain. For detailed information about the display connection command, refer to AAA Commands in the Security Volume.

Related commands: display dot1x.

Examples

# Configure the mandatory authentication domain my-domain for 802.1X users on GigabitEthernet 2/0/1.

<Sysname> system-view

[Sysname] interface GigabitEthernet 2/0/1

[Sysname-GigabitEthernet2/0/1] dot1x mandatory-domain my-domain

# After 802.1X user usera passes the authentication, display the user connection information on GigabitEthernet 2/0/1.

[Sysname-GigabitEthernet2/0/1] display connection interface GigabitEthernet 2/0/1

 

Index=68  ,Username=usera@my-domian

MAC=0015-e9a6-7cfe   ,IP=3.3.3.3

 Total 1 connection(s) matched.

dot1x max-user

Syntax

In system view:

dot1x max-user user-number [ interface interface-list ]

undo dot1x max-user [ interface interface-list ]

In Ethernet interface view:

dot1x max-user user-number

undo dot1x max-user

View

System view, Ethernet interface view

Default Level

2: System level

Parameters

user-number: Maximum number of users to be supported simultaneously, in the range 1 to 1024.

interface interface-list: Specifies an Ethernet port list, which can contain multiple Ethernet ports. The interface-list argument is in the format of interface-list = { interface-type interface-number [ to interface-type interface-number ] } & <1-10>, where interface-type represents the port type, interface-number represents the port number, and & <1-10> means that you can provide up to 10 port indexes/port index lists for this argument. The start port number must be smaller than the end number and the two ports must be of the same type.

Description

Use the dot1x max-user command to set the maximum number of users to be supported simultaneously for specified or all ports.

Use the undo dot1x max-user command to restore the default.

With no interface specified, the command sets the threshold for all ports.

Related commands: display dot1x.

Examples

# Set the maximum number of users for port GigabitEthernet 2/0/1 to support simultaneously as 32.

<Sysname> system-view

[Sysname] dot1x max-user 32 interface GigabitEthernet 2/0/1

Or

<Sysname> system-view

[Sysname] interface GigabitEthernet 2/0/1

[Sysname-GigabitEthernet2/0/1] dot1x max-user 32

dot1x multicast-trigger

Syntax

dot1x multicast-trigger

undo dot1x multicast-trigger

View

Interface view

Default Level

2: System level

Parameters

None

Description

Use the dot1x multicast-trigger command to enable the multicast trigger function of 802.1X to send multicast trigger messages to the clients periodically.

Use the undo dot1x multicast-trigger command to disable this function.

By default, the multicast trigger function is enabled.

Related commands: display dot1x.

Examples

# Disable the multicast trigger function for interface GigabitEthernet2/0/1.

<Sysname> system-view

[Sysname] interface GigabitEthernet2/0/1

[Sysname- GigabitEthernet2/0/1] undo dot1x multicast-trigger

dot1x port-control

Syntax

In system view:

dot1x port-control { authorized-force | auto | unauthorized-force } [ interface interface-list ]

undo dot1x port-control [ interface interface-list ]

In Ethernet interface view:

dot1x port-control { authorized-force | auto | unauthorized-force }

undo dot1x port-control

View

System view, Ethernet interface view

Default Level

2: System level

Parameters

authorized-force: Places the specified or all ports in the authorized state, allowing users of the ports to access the network without authentication.

auto: Places the specified or all ports in the unauthorized state initially to allow only EAPOL frames to pass, and turns the ports into the authorized state to allow access to the network after the users pass authentication. This is the most common choice.

unauthorized-force: Places the specified or all ports in the unauthorized state, denying any access requests from users of the ports.

interface interface-list: Specifies an Ethernet port list, which can contain multiple Ethernet ports. The interface-list argument is in the format of interface-list = { interface-type interface-number [ to interface-type interface-number ] } & <1-10>, where interface-type represents the port type, interface-number represents the port number, and & <1-10> means that you can provide up to 10 port indexes/port index lists for this argument. The start port number must be smaller than the end number and the two ports must be of the same type.

Description

Use the dot1x port-control command to set the access control mode for specified or all ports.

Use the undo dot1x port-control command to restore the default.

The default access control mode is auto.

Related commands: display dot1x.

Examples

# Set the access control mode of port GigabitEthernet 2/0/1 to unauthorized-force.

<Sysname> system-view

[Sysname] dot1x port-control unauthorized-force interface GigabitEthernet 2/0/1

Or

<Sysname> system-view

[Sysname] interface GigabitEthernet 2/0/1

[Sysname-GigabitEthernet2/0/1] dot1x port-control unauthorized-force

dot1x port-method

Syntax

In system view:

dot1x port-method { macbased | portbased } [ interface interface-list ]

undo dot1x port-method [ interface interface-list ]

In Ethernet interface view:

dot1x port-method { macbased | portbased }

undo dot1x port-method

View

System view, Ethernet interface view

Default Level

2: System level

Parameters

macbased: Specifies to use the macbased authentication method. With this method, each user of a port must be authenticated separately, and when an authenticated user goes offline, no other users are affected.

portbased: Specifies to use the portbased authentication method. With this method, after the first user of a port passes authentication, all other users of the port can access the network without authentication, and when the first user goes offline, all other users get offline at the same time.

interface interface-list: Specifies an Ethernet port list, which can contain multiple Ethernet ports. The interface-list argument is in the format of interface-list = { interface-type interface-number [ to interface-type interface-number ] } & <1-10>, where interface-type represents the port type, interface-number represents the port number, and & <1-10> means that you can provide up to 10 port indexes/port index lists for this argument. The start port number must be smaller than the end number and the two ports must be of the same type.

Description

Use the dot1x port-method command to set the access control method for specified or all ports.

Use the undo dot1x port-method command to restore the default.

The default access control method is macbased.

Related commands: display dot1x.

Examples

# Set the access control method to portbased for port GigabitEthernet 2/0/1.

<Sysname> system-view

[Sysname] dot1x port-method portbased interface GigabitEthernet 2/0/1

Or

<Sysname> system-view

[Sysname] interface GigabitEthernet 2/0/1

[Sysname-GigabitEthernet2/0/1] dot1x port-method portbased

dot1x quiet-period

Syntax

dot1x quiet-period

undo dot1x quiet-period

View

System view

Default Level

2: System level

Parameters

None

Description

Use the dot1x quiet-period command to enable the quiet timer function.

Use the undo dot1x quiet-period command to disable the function.

By default, the function is disabled.

After a supplicant fails the authentication, the authenticator refuses further authentication requests from the supplicant in the period dictated by the quiet timer.

Related commands: display dot1x, dot1x timer.

Examples

# Enable the quiet timer.

<Sysname> system-view

[Sysname] dot1x quiet-period

dot1x retry

Syntax

dot1x retry max-retry-value

undo dot1x retry

View

System view

Default Level

2: System level

Parameters

max-retry-value: Maximum number of attempts to send an authentication request to a supplicant, in the range 1 to 10.

Description

Use the dot1x retry command to set the maximum number of attempts to send an authentication request to a supplicant.

Use the undo dot1x retry command to restore the default.

By default, the authenticator can send an authentication request to a supplicant twice at most.

Note that after sending an authentication request to a supplicant, the authenticator may retransmit the request if it does not receive any response at an interval specified by the username request timeout timer or supplicant timeout timer. The number of retransmission attempts is one less than the value set by this command.

Related commands: display dot1x.

Examples

# Set the maximum number of attempts to send an authentication request to a supplicant as 9.

<Sysname> system-view

[Sysname] dot1x retry 9

dot1x supp-proxy-check

Syntax

In system view:

dot1x supp-proxy-check { logoff | trap } [ interface interface-list ]

undo dot1x supp-proxy-check { logoff | trap } [ interface interface-list ]

In Ethernet interface view:

dot1x supp-proxy-check { logoff | trap }

undo dot1x supp-proxy-check { logoff | trap }

View

System view, Ethernet interface view

Default Level

2: System level

Parameters

logoff: Gets offline any user trying to log in through a proxy.

trap: Sends a trap to the network management system when detecting that a user is trying to log in through a proxy.

interface interface-list: Specifies an Ethernet port list, which can contain multiple Ethernet ports. The interface-list argument is in the format of interface-list = { interface-type interface-number [ to interface-type interface-number ] } & <1-10>, where interface-type represents the port type, interface-number represents the port number, and & <1-10> means that you can provide up to 10 port indexes/port index lists for this argument. The start port number must be smaller than the end number and the two ports must be of the same type.

Description

Use the dot1x supp-proxy-check command to enable detection and control of users logging in through proxies for specified or all ports.

Use the undo dot1x supp-proxy-check command to disable the function for specified or all ports.

By default, the function is disabled.

Note that:

l          This function requires the cooperation of the 802.1X client program by H3C.

l          In system view, this command enables detection and control of users’ login for all ports with interface-list not provided, and enables detection and control of users’ login for specified ports with interface-list provided.

l          In Ethernet interface view, you cannot specify the interface-list argument and can only enable detection and control of users’ login for the current port.

l          This function must be enabled both globally in system view and for the intended ports in system view or Ethernet interface view. Otherwise, it does not work.

Related commands: display dot1x.

Examples

# Specify ports GigabitEthernet 2/0/1 to 1/8 to get users offline when they are trying to log in through proxies.

<Sysname> system-view

[Sysname] dot1x supp-proxy-check logoff

[Sysname] dot1x supp-proxy-check logoff interface GigabitEthernet 2/0/1 to GigabitEthernet 2/0/8

# Specify port GigabitEthernet 2/0/9 to send a trap packet when detecting that a user is trying to log in through a proxy.

<Sysname> system-view

[Sysname] dot1x supp-proxy-check trap

[Sysname] dot1x supp-proxy-check trap interface GigabitEthernet 2/0/9

Or

<Sysname> system-view

[Sysname] dot1x supp-proxy-check trap

[Sysname] interface GigabitEthernet 2/0/9

[Sysname-GigabitEthernet2/0/9] dot1x supp-proxy-check trap

dot1x timer

Syntax

dot1x timer { handshake-period handshake-period-value | quiet-period quiet-period-value | server-timeout server-timeout-value | supp-timeout supp-timeout-value | tx-period tx-period-value }

undo dot1x timer { handshake-period | quiet-period | server-timeout | supp-timeout | tx-period }

View

System view

Default Level

2: System level

Parameters

handshake-period-value: Setting for the handshake timer in seconds. It ranges from 5 to 1024 and defaults to 15.

quiet-period-value: Setting for the quiet timer in seconds. It ranges from 10 to 120 and defaults to 60.

server-timeout-value: Setting for the server timeout timer in seconds. It ranges from 100 to 300 and defaults to 100.

supp-timeout-value: Setting for the supplicant timeout timer in seconds. It ranges from 10 to 120 and defaults to 30.

tx-period-value: Setting for the username request timeout timer in seconds. It ranges from 10 to 120 and defaults to 30.

Description

Use the dot1x timer command to set 802.1X timers.

Use the undo dot1x timer command to restore the defaults.

Several timers are used in the 802.1X authentication process to guarantee that the supplicants, the authenticators, and the RADIUS server interact with each other in a reasonable manner. You can use this command to set these timers:

l          Handshake timer (handshake-period): After a supplicant passes authentication, the authenticator sends to the supplicant handshake requests at this interval to check whether the supplicant is online. If the authenticator receives no response after sending the allowed maximum number of handshake requests, it considers that the supplicant is offline.

l          Quiet timer (quiet-period): When a supplicant fails the authentication, the authenticator refuses further authentication requests from the supplicant in this period of time.

l          Server timeout timer (server-timeout): Once an authenticator sends a RADIUS Access-Request packet to the authentication server, it starts this timer. If this timer expires but it receives no response from the server, it retransmits the request.

l          Supplicant timeout timer (supp-timeout): Once an authenticator sends an EAP-Request/MD5 Challenge frame to a supplicant, it starts this timer. If this timer expires but it receives no response from the supplicant, it retransmits the request.

l          Username request timeout timer (tx-period): Once an authenticator sends an EAP-Request/Identity frame to a supplicant, it starts this timer. If this timer expires but it receives no response from the supplicant, it retransmits the request. In addition, to be compatible with clients that do not send EAPOL-Start requests unsolicitedly, the device multicasts EAP-Request/Identity frame periodically to detect the clients, with the multicast interval defined by tx-period.

It is unnecessary to change the timers unless in some special or extreme network environments. The change of a timer takes effect immediately.

Related commands: display dot1x.

Examples

# Set the server timeout timer to 150 seconds.

<Sysname> system-view

[Sysname] dot1x timer server-timeout 150

reset dot1x statistics

Syntax

reset dot1x statistics [ interface interface-list ]

View

User view

Default Level

2: System level

Parameters

interface interface-list: Specifies an Ethernet port list, which can contain multiple Ethernet ports. The interface-list argument is in the format of interface-list = { interface-type interface-number [ to interface-type interface-number ] } & <1-10>, where interface-type represents the port type, interface-number represents the port number, and & <1-10> means that you can provide up to 10 port indexes/port index lists for this argument. The start port number must be smaller than the end number and the two ports must be of the same type.

Description

Use the reset dot1x statistics command to clear 802.1X statistics.

With the interface interface-list argument specified, the command clears 802.1X statistics on the specified ports. With the argument unspecified, the command clears global 802.1X statistics and 802.1X statistics on all ports.

Related commands: display dot1x.

Examples

# Clear 802.1X statistics on port GigabitEthernet 2/0/1.

<Sysname> reset dot1x statistics interface GigabitEthernet 2/0/1

 


EAD Fast Deployment Configuration Commands

dot1x free-ip

Syntax

dot1x free-ip ip-address { mask-address | mask-length }

undo dot1x free-ip { ip-address { mask | mask-length } | all }

View

System view

Default Level

2: System level

Parameters

ip-address: IP address of the freely accessible network segment, also called a free IP.

mask: Mask of the freely accessible network segment.

mask-length: Length of the mask of the freely accessible network segment.

all: Specifies all the freely accessible network segments.

Description

Use the dot1x free-ip command to configure a freely accessible network segment, that is, a network segment that users can access before passing 802.1X authentication.

Use the undo dot1x free-ip command to remove one or all freely accessible network segments.

By default, no freely accessible network segment is configured.

Note that:

l          The free IP function is mutually exclusive with the global MAC authentication function, the port security function, and the guest VLAN function on a port.

l          The free IP function is effective only when the port access control mode is auto.

l          The maximum number of freely accessible network segments is four now..

Related commands: display dot1x.

Examples

# Configure 192.168.0.0 as a freely accessible network segment.

<Sysname> system-view

[Sysname] dot1x free-ip 192.168.0.0 24

dot1x timer ead-timeout

Syntax

dot1x timer ead-timeout ead-timeout-value

undo dot1x timer ead-timeout

View

System view

Default Level

2: System level

Parameters

ead-timeout-value: EAD rule timeout time, in the range 1 minute to 1440 minutes.

Description

Use the dot1x timer ead-timeout command to set the EAD rule timeout time.

Use the undo dot1x timer ead-timeout command to restore the default.

By default, the timeout time is 30 minutes.

Related commands: display dot1x.

Examples

# Set the EAD rule timeout time to 5 minutes.

<Sysname> system-view

[Sysname] dot1x timer ead-timeout 5

dot1x url

Syntax

dot1x url url-string

undo dot1x [ url-string ]

View

System view

Default Level

2: System level

Parameters

url-string: Redirect URL, a case-sensitive string of 1 to 64 characters in the format http://string/.

Description

Use the dot1x url command to configure a redirect URL. After a redirect URL is configured, when a user uses a Web browser to access networks other than the free IP, the device will redirect the user to the redirect URL.

Use the undo dot1x url command to remove the redirect URL.

By default, no redirect URL is defined.

Note that:

l          The redirect URL and the free IP must be in the same network segment; otherwise, the URL may be inaccessible.

l          You can configure the dot1x url command for more than once but only the last one takes effect.

Related commands: display dot1x, dot1x free-ip.

Examples

# Configure the redirect URL as http://192.168.0.1.

<Sysname> system-view

[Sysname] dot1x url http://192.168.0.1

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网