07-Security Configuration Guide

HomeSupportConfigure & DeployConfiguration GuidesH3C Access Controllers Configuration Guides(E3703P61 R2509P61 R3709P61 R2609P61 R3509P61)-6W10207-Security Configuration Guide
04-MAC Authentication Configuration
Title Size Download
04-MAC Authentication Configuration 189.06 KB

Configuring MAC authentication

Overview

MAC authentication controls network access by authenticating source MAC addresses on a port. It does not require client software and users do not need to enter a username and password for network access. The device initiates a MAC authentication process when it detects an unknown source MAC address on a MAC authentication enabled port. If the MAC address passes authentication, the user can access authorized network resources. If the authentication fails, the device marks the MAC address as a silent MAC address, drops the packet, and starts a quiet timer. The device drops all subsequent packets from the MAC address within the quiet time. The quiet mechanism avoids repeated authentication during a short time.

 

 

NOTE:

If the MAC address that has failed authentication is a static MAC address or a MAC address that has passed any security authentication, the device does not mark the MAC address as a silent address.

 

User account policies

MAC authentication supports the following user account policies:

·     One MAC-based user account for each user. The access device uses the source MAC addresses in packets as the usernames and passwords of users for MAC authentication. This policy is suitable for an insecure environment.

·     One shared user account for all users. You specify one username and password, which are not necessarily a MAC address, for all MAC authentication users on the access device. This policy is suitable for a secure environment.

Authentication approaches

You can perform MAC authentication on the access device (local authentication) or through a RADIUS server.

Suppose a source MAC unknown packet arrives at a MAC authentication enabled port.

Local authentication:

·     If MAC-based accounts are used, the access device uses the source MAC address of the packet as the username and password to search its local account database for a match.

·     If a shared account is used, the access device uses the shared account username and password to search its local account database for a match.

RADIUS authentication:

·     If MAC-based accounts are used, the access device sends the source MAC address as the username and password to the RADIUS server for authentication.

·     If a shared account is used, the access device sends the shared account username and password to the RADIUS server for authentication.

For more information about configuring local authentication and RADIUS authentication, see "Configuring AAA."

MAC authentication timers

MAC authentication uses the following timers:

·     Offline detect timer—Sets the interval that the device waits for traffic from a user before it regards the user as idle. If a user connection has been idle within the interval, the device logs the user out and stops accounting for the user.

·     Quiet timer—Sets the interval that the device must wait before it can perform MAC authentication for a user that has failed MAC authentication. All packets from the MAC address are dropped during the quiet time. This quiet mechanism prevents repeated authentication from affecting system performance.

·     Server timeout timer—Sets the interval that the access device waits for a response from a RADIUS server before it regards the RADIUS server unavailable. If the timer expires during MAC authentication, the user cannot access the network.

Using MAC authentication with other features

VLAN assignment

You can specify a VLAN in the user account for a MAC authentication user to control its access to network resources. After the user passes MAC authentication, the authentication server, either the local access device or a RADIUS server, assigns the VLAN to the port as the default VLAN. After the user logs off, the initial default VLAN, or the default VLAN configured before any VLAN is assigned by the authentication server, restores. If the authentication server assigns no VLAN, the initial default VLAN applies.

A hybrid port is always assigned to a server-assigned VLAN as an untagged member. After the assignment, do not reconfigure the port as a tagged member in the VLAN.

If MAC-based VLAN is enabled on a hybrid port, the device maps the server-assigned VLAN to the MAC address of the user. The default VLAN of the hybrid port does not change.

ACL assignment

You can specify an ACL in the user account for a MAC authentication user to control its access to network resources. After the user passes MAC authentication, the authentication server, either the local access device or a RADIUS server, assigns the ACL to the access port to filter the traffic from this user. You must configure the ACL on the access device for the ACL assignment function. You can change ACL rules while the user is online.

Guest VLAN

You can configure a guest VLAN to accommodate MAC authentication users that have failed MAC authentication on the port. Users in the MAC authentication guest VLAN can access a limited set of network resources, such as a software server, to download anti-virus software and system patches. If no MAC authentication guest VLAN is configured, the user that fails MAC authentication cannot access any network resources.

If a user in the guest VLAN passes MAC authentication, that user is removed from the guest VLAN and can access all authorized network resources. If not, the user is still in the MAC authentication guest VLAN.

A hybrid port is always assigned to a guest VLAN as an untagged member. After the assignment, do not reconfigure the port as a tagged member in the VLAN.

MAC-after-portal

The MAC-after-portal feature triggers MAC authentication for only portal-authenticated users. The AC allows only these users to pass MAC authentication and assigns them to VLANs that perform local forwarding on an AP. For more information about local forwarding, see WLAN Configuration Guide.

When a user accesses the wireless network for the first time, the AC uses the process to implement the MAC-after-portal feature:

1.     Identifies that the user is not portal authenticated and assigns the user to the MAC authentication guest VLAN.

2.     Performs portal authentication for the user.

After the user passes portal authentication, MAC authentication is triggered.

3.     Determines that the portal-authenticated user passes MAC authentication.

4.     Assigns the user to the server-authorized VLAN that performs local forwarding. The AC issues the MAC-VLAN entry of the user to the AP for local forwarding.

The portal module tags a portal-authenticated user as always online unless the idle-cut period is reached. When the user accesses the network during the idle-cut period, the user passes MAC authentication directly. The AC does not perform portal authentication because the user is tagged as portal authenticated.

Configuration task list

Task

Remarks

Basic configuration for MAC authentication:

·     Configuring MAC authentication globally

·     Configuring MAC authentication on a port

Required.

Specifying a MAC authentication domain

Optional.

Configuring a MAC authentication guest VLAN

Optional.

Configuring the MAC-after-portal feature

Optional.

Configuring the accounting delay feature

Optional.

Enabling portal authentication bypass for MAC-authenticated users

Optional.

 

Basic configuration for MAC authentication

Before you perform basic configuration for MAC authentication, complete the following tasks:

·     Create and configure an authentication domain, also called "an ISP domain."

·     For local authentication, create local user accounts, and specify the lan-access service for the accounts.

·     For RADIUS authentication, check that the device and the RADIUS server can reach each other, and create user accounts on the RADIUS server.

If you are using MAC-based accounts, make sure the username and password for each account is the same as the MAC address of the MAC authentication users.

Configuring MAC authentication globally

MAC authentication can take effect on a port only when it is enabled globally and on the port.

To configure MAC authentication globally:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Enable MAC authentication globally.

mac-authentication

By default, MAC authentication is disabled globally.

MAC authentication is enabled globally after the port security feature is enabled.

3.     Configure MAC authentication timers.

mac-authentication timer { offline-detect offline-detect-value | quiet quiet-value | server-timeout server-timeout-value }

Optional.

By default, the offline detect timer is 300 seconds, the quiet timer is 60 seconds, and the server timeout timer is 100 seconds.

4.     Configure the properties of MAC authentication user accounts.

mac-authentication user-name-format { fixed [ account name ] [ password { cipher | simple } password ] | mac-address [ { with-hyphen | without-hyphen } [ lowercase | uppercase ] ] }

Optional.

By default, the username and password for a MAC authentication user account must be a MAC address, and the letters in the MAC address are unhyphenated and in lower case.

 

Configuring MAC authentication on a port

MAC authentication is exclusive with link aggregation group:

·     You cannot enable MAC authentication on a port already in a link aggregation group.

·     You cannot add a MAC authentication enabled port to a link aggregation group.

To configure MAC authentication on a port:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Enable MAC authentication.

·     On a group of Ethernet interfaces in system view:
mac-authentication interface interface-list

·     On an Ethernet interface in interface view:

a.     interface interface-type interface-number

b.     mac-authentication

·     On a WLAN-ESS or WLAN-MESH interface:
See "Configuring port security").

Use one of the methods.

By default, MAC authentication is disabled on a port.

3.     Set the maximum number of concurrent MAC authentication users allowed on a port.

mac-authentication max-user user-number

Optional.

The default depends on the device model. For more information, see About the H3C Access Controllers Command References.

 

Specifying a MAC authentication domain

By default, MAC authentication users are in the system default authentication domain. To implement different access policies for users, you can specify authentication domains for MAC authentication users in the following ways:

·     Specify a global authentication domain in system view. This domain setting applies to all ports.

·     Specify an authentication domain for an individual port in interface view.

MAC authentication chooses an authentication domain for users on a port in the following order: the port-specific domain, the global domain, and the default domain. For more information about authentication domains, see "Configuring AAA."

To specify an authentication domain for MAC authentication users:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Specify an authentication domain for MAC authentication users in system view or interface view.

·     In system view:
mac-authentication domain domain-name

·     In interface view:

a.     interface interface-type interface-number

b.     mac-authentication domain domain-name

By default, the system default authentication domain is used for MAC authentication users.

 

Configuring a MAC authentication guest VLAN

Before you configure a MAC authentication guest VLAN on a port, complete the following tasks:

·     Enable MAC authentication.

·     Enable MAC-based VLAN on the port.

·     Create the VLAN to be specified as the MAC authentication guest VLAN.

To configure a MAC authentication guest VLAN:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Enter WLAN-ESS interface view.

interface interface-type interface-number

N/A

3.     Specify a MAC authentication guest VLAN.

mac-authentication guest-vlan guest-vlan-id

By default, no MAC authentication guest VLAN is configured.

You can configure only one MAC authentication guest VLAN on a port.

 

Follow the guidelines in Table 1 when configuring a MAC authentication guest VLAN on a port.

Table 1 Relationships of the MAC authentication guest VLAN with other security features

Feature

Relationship description

Reference

Quiet function of MAC authentication

The MAC authentication guest VLAN function has higher priority. A user can access any resources in the guest VLAN.

See "MAC authentication timers."

Port intrusion protection

The MAC authentication guest VLAN function has higher priority than the block MAC action, but lower priority than the shutdown port action of the port intrusion protection feature.

See "Configuring port security."

802.1X guest VLAN on a port that performs MAC-based access control

The MAC authentication guest VLAN has a lower priority.

See "Configuring 802.1X."

 

Configuring the MAC-after-portal feature

Use the MAC-after-portal feature with the local forwarding and local portal server functions.

Before you configure this feature on a WLAN-ESS interface, complete the following tasks:

·     Configure a clear-type service.

·     Enable MAC authentication globally and on the interface.

·     Enable the MAC-based VLAN function on the interface.

·     Enable the local portal server function in the MAC authentication guest VLAN.

·     Configure the MAC authentication guest VLAN, and specify it as the VLAN to perform centralized forwarding.

·     Configure VLAN assignment for MAC-authenticated users, and specify the VLAN to perform local forwarding.

·     Configure local portal and local MAC authentication parameters.

To configure the MAC-after-portal feature:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Enter WLAN-ESS interface view.

interface interface-type interface-number

N/A

3.     Configure MAC-after-portal.

mac-authentication trigger after-portal [ wait-time wait-time-value ]

By default, this feature is disabled.

 

Configuring the accounting delay feature

The accounting delay feature enables the device to delay sending the accounting request for an authenticated MAC authentication user. If the device gets the user's IP address within the delay period, it includes the IP address in the accounting request and starts the accounting process for the user. If the device fails to get the user's IP address, it starts the accounting process or logs off the user depending on your configuration.

H3C recommends that you enable the accounting delay feature when the following conditions exist:

·     MAC authentication users obtain IP addresses through DHCP.

·     The accounting server requires user IP addresses for accounting management.

To configure the accounting delay feature on an MAC authentication-enabled port:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Enter Layer 2 Ethernet interface view or WLAN-ESS interface view.

interface interface-type interface-number

N/A

3.     Configure the accounting delay settings.

mac-authentication accounting-delay [ logoff | time time ] *

By default, accounting delay is disabled. When a user passes MAC authentication, the device immediately sends an accounting request to the accounting server, regardless of whether it has obtained the user's IP address.

 

Enabling portal authentication bypass for MAC-authenticated users

This feature enables MAC-authenticated users to access the authorized resources without performing portal authentication when the device is configured with both MAC authentication and portal authentication.

To enable portal authentication bypass for MAC-authenticated users:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Enter WLAN-ESS interface view.

interface wlan-ess interface-number

N/A

3.     Enable portal authentication bypass for MAC-authenticated users.

mac-authentication bypass-portal enable

By default, portal authentication bypass for MAC-authenticated users is disabled.

 

Displaying and maintaining MAC authentication

Task

Command

Remarks

Display MAC authentication information.

display mac-authentication [ interface interface-list ] [ | { begin | exclude | include } regular-expression ]

Available in any view.

Clear MAC authentication statistics.

reset mac-authentication statistics [ interface interface-list ]

Available in user view.

 

MAC authentication configuration examples

Local MAC authentication configuration example

Network requirements

In the network in Figure 1, perform local MAC authentication on WLAN-ESS interface of the AC to control Internet access. Make sure:

·     All users belong to domain aabbcc.net.

·     Each local user uses the MAC address as the username and password for MAC authentication. The user accounts use the default format.

Figure 1 Network diagram

 

Configuration procedure

# Add a local user account, set both the username and password to 00e0fc123456, the MAC address of the user host, and enable LAN access service for the account.

<AC> system-view

[AC] local-user 00e0fc123456

[AC-luser-00e0fc123456] password simple 00e0fc123456

[AC-luser-00e0fc123456] service-type lan-access

[AC-luser-00e0fc123456] quit

# Configure ISP domain aabbcc.net to perform local authentication for access users.

[AC] domain aabbcc.net

[AC-isp-aabbcc.net] authentication lan-access local

[AC-isp-aabbcc.net] quit

# Specify the ISP domain for MAC authentication.

[AC] mac-authentication domain aabbcc.net

# Enable port security.

[AC] port-security enable

# Configure WLAN port security, using MAC authentication.

[AC] interface wlan-ess 0

[AC-WLAN-ESS0] port-security port-mode mac-authentication

[AC-WLAN-ESS0] port-security tx-key-type 11key

[AC-WLAN-ESS0] port-security preshared-key pass-phrase 12345678

[AC-WLAN-ESS0] quit

# Create service template 2, configure its SSID as mac-authentication-local, and bind port WLAN-ESS 0 to service template 2.

[AC] wlan service-template 2

[AC-wlan-st-2] ssid mac-authentication-local

[AC-wlan-st-2] bind wlan-ess 0

[AC-wlan-st-2] authentication-method open-system

[AC-wlan-st-2] service-template enable

[AC-wlan-st-2] quit

# Create an AP template named ap1, specify the model as WA3628i-AGN and serial number as 210235A29G007C000020.

[AC] wlan ap ap1 model WA3628i-AGN

[AC-wlan-ap-ap1] serial-id 210235A29G007C000020

# Bind service template 2 to radio 1.

[AC-wlan-ap-ap1] radio 1 type dot11an

[AC-wlan-ap-ap1-radio-1] service-template 2

[AC-wlan-ap-ap1-radio-1] radio enable

[AC-wlan-ap-ap1-radio-1] return

Verifying the configuration

# After the WLAN user passes MAC authentication, display MAC authentication settings and statistics.

<AC> display mac-authentication interface WLAN-DBSS 0:0

MAC address authentication is enabled.

 User name format is MAC address in lowercase, like xxxxxxxxxxxx

 Fixed username:mac

 Fixed password:not configured

          Offline detect period is 300s

          Quiet period is 60s

          Server response timeout value is 100s

          The max allowed user number is 4096 per slot

          Current user number amounts to 1

          Current domain is aabbcc.net

 

Silent MAC User info:

          MAC Addr         From Port                    Port Index

 

WLAN-DBSS0:6 is link-up

  MAC address authentication is enabled

  Authenticate success: 0, failed: 0

 Max number of on-line users is 4096

  Current online user number is 1

          MAC Addr         Authenticate State           Auth Index

          00e0-fc12-3456   MAC_AUTHENTICATOR_AUTHOR      1299

# Display the online user information.

<AC>display connection

 

Index=1299,Username=00e0fcl23456@aabbcc.net

MAC=00-E0-FC-12-34-56

IP=N/A

IPv6=N/A

Online=00h00m53s

 Total 1 connection(s) matched.

RADIUS-based MAC authentication configuration example

Network requirements

As shown in Figure 2, a WLAN client connects to the AC through a Layer 2 switch. The AC uses RADIUS servers for authentication, authorization, and accounting.

Perform MAC authentication on WLAN-ESS interface to control Internet access. Make sure that:

·     The AC detects whether a user has gone offline every 180 seconds.

·     All MAC authentication users belong to ISP domain 2000 and share the user account aaa with password 123456.

Figure 2 Network diagram

 

Configuration procedure

Make sure the RADIUS server and the AC can reach each other.

# Create a shared account for MAC authentication users on the RADIUS server, and set the username aaa and password 123456 for the account. (Details not shown.)

# Configure IP addresses of the interfaces. (Details not shown.)

# Configure a RADIUS scheme.

<AC> system-view

[AC] radius scheme 2000

[AC-radius-2000] primary authentication 10.1.1.1 1812

[AC-radius-2000] primary accounting 10.1.1.2 1813

[AC-radius-2000] key authentication simple abc

[AC-radius-2000] key accounting simple abc

[AC-radius-2000] user-name-format without-domain

[AC-radius-2000] quit

# Apply the RADIUS scheme to ISP domain 2000 for authentication, authorization, and accounting.

[AC] domain 2000

[AC-isp-2000] authentication default radius-scheme 2000

[AC-isp-2000] authorization default radius-scheme 2000

[AC-isp-2000] accounting default radius-scheme 2000

[AC-isp-2000] quit

# Enable port security.

[AC] port-security enable

# Configure the WLAN port security, using MAC and PSK authentication, and specify the domain 2000 as the authentication domain for MAC authentication users on the port.

[AC] interface wlan-ess 0

[AC-WLAN-ESS0] port-security port-mode mac-and-psk

[AC-WLAN-ESS0] port-security tx-key-type 11key

[AC-WLAN-ESS0] port-security preshared-key pass-phrase 12345678

[AC-WLAN-ESS0] mac-authentication domain 2000

[AC-WLAN-ESS0] quit

# Create service template 2 of crypto type, configure its SSID as mac-authentication-radius and bind port WLAN-ESS 0 to service template 2.

 [AC] wlan service-template 2 crypto

[AC-wlan-st-2] ssid mac-authentication-radius

[AC-wlan-st-2] bind wlan-ess 0

[AC-wlan-st-2] authentication-method open-system

[AC-wlan-st-2] cipher-suite ccmp

[AC-wlan-st-2] security-ie rsn

[AC-wlan-st-2] service-template enable

[AC-wlan-st-2] quit

# Create an AP template named ap1, specify the model as WA3628i-AGN and serial number as 210235A29G007C000020.

[AC] wlan ap ap1 model WA3628i-AGN

[AC-wlan-ap-ap1] serial-id 210235A29G007C000020

# Bind service template 2 to radio 1.

[AC-wlan-ap-ap1] radio 1 type dot11an

[AC-wlan-ap-ap1-radio-1] service-template 2

[AC-wlan-ap-ap1-radio-1] radio enable

[AC-wlan-ap-ap1-radio-1] quit

[AC-wlan-ap-ap1] quit

# Specify the ISP domain for MAC authentication.

[AC] mac-authentication domain 2000

# Set the MAC authentication offline detect timer to 180 seconds.

[AC] mac-authentication timer offline-detect 180

# Specify username aaa and plaintext password 123456 for the account shared by MAC authentication users.

[AC] mac-authentication user-name-format fixed account aaa password simple 123456

Verifying the configuration

# After a WLAN user passes MAC authentication, display MAC authentication settings and statistics.

<AC> display mac-authentication interface WLAN-DBSS0:7

MAC address authentication is enabled.

 User name format is fixed account

 Fixed username:aaa

 Fixed password:******

         Offline detect period is 180s

         Quiet period is 60s

         Server response timeout value is 100s

         The max allowed user number is 4096 per slot

         Current user number amounts to 1

         Current domain is 2000

 

Silent MAC User info:

         MAC Addr         From Port                    Port Index

 

WLAN-DBSS0:7 is link-up

  MAC address authentication is enabled

  Authenticate success: 1, failed: 0

 Max number of on-line users is 4096

  Current online user number is 1

         MAC Addr         Authenticate State           Auth Index

         000e-35b2-8be9   MAC_AUTHENTICATOR_SUCCESS     1297

# Display the online user information.

<AC> display connection

 

Index=1297,Username=aaa@2000

MAC=00-0E-35-B2-8B-E9

IP=N/A

IPv6=N/A

Online=00h00m53s

 Total 2 connection(s) matched.

ACL assignment configuration example

Network requirements

As shown in Figure 3, a WLAN client connects to the AC and the AC uses RADIUS servers to perform authentication, authorization, and accounting.

Perform MAC authentication on port WLAN-ESS 0 to control Internet access. Make sure that an authenticated user can access the Internet but the FTP server at 10.0.0.1.

Use MAC-based user accounts for MAC authentication users. The MAC addresses are hyphen separated and in lower case.

Figure 3 Network diagram

 

Configuration procedure

Make sure the RADIUS server and the AC can reach each other.

1.     Add a user account with 00-e0-fc-12-34-56 as both the username and password on the RADIUS server, and specify ACL 3000 as the authorization ACL for the user account. (Details not shown.)

2.     Configure the ACL:

# Configure IP addresses of the interfaces. (Details not shown.)

# Configure ACL 3000 to deny packets destined to 10.0.0.1.

<AC> system-view

[AC] acl number 3000

[AC-acl-adv-3000] rule 0 deny ip destination 10.0.0.1 0

[AC-acl-adv-3000] quit

3.     Configure RADIUS-based MAC authentication on the AC:

# Configure a RADIUS scheme.

[AC] radius scheme 2000

[AC-radius-2000] primary authentication 10.1.1.1 1812

[AC-radius-2000] primary accounting 10.1.1.2 1813

[AC-radius-2000] key authentication simple abc

[AC-radius-2000] key accounting simple abc

[AC-radius-2000] user-name-format without-domain

[AC-radius-2000] quit

# Apply the RADIUS scheme to an ISP domain for authentication, authorization, and accounting.

[AC] domain 2000

[AC-isp-2000] authentication default radius-scheme 2000

[AC-isp-2000] authorization default radius-scheme 2000

[AC-isp-2000] accounting default radius-scheme 2000

[AC-isp-2000] quit

# Specify the ISP domain for MAC authentication.

[AC] mac-authentication domain 2000

# Configure the AC to use MAC-based user accounts, the MAC addresses are hyphen separated and in lower case.

[AC] mac-authentication user-name-format mac-address with-hyphen lowercase

# Enable port security.

[AC] port-security enable

# Configure the WLAN port security, using MAC and PSK authentication, and specify the domain 2000 as the authentication domain for MAC authentication users on the port.

[AC] interface wlan-ess 0

[AC-WLAN-ESS0] port-security port-mode mac-and-psk

[AC-WLAN-ESS0] port-security tx-key-type 11key

[AC-WLAN-ESS0] port-security preshared-key pass-phrase 12345678

[AC-WLAN-ESS0] mac-authentication domain 2000

[AC-WLAN-ESS0] quit

# Create service template 2 of crypto type, configure its SSID as mac-authentication-acl, and bind port WLAN-ESS 0 to service template 2.

[AC] wlan service-template 2 crypto

[AC-wlan-st-2] ssid mac-authentication-acl

[AC-wlan-st-2] bind wlan-ess 0

[AC-wlan-st-2] authentication-method open-system

[AC-wlan-st-2] cipher-suite ccmp

[AC-wlan-st-2] security-ie rsn

[AC-wlan-st-2] service-template enable

[AC-wlan-st-2] quit

# Create an AP template named ap1, specify the model as WA3628i-AGN and serial number as 210235A29G007C000020.

[AC] wlan ap ap1 model WA3628i-AGN

[AC-wlan-ap-ap1] serial-id 210235A29G007C000020

# Bind service template 2 to radio 1.

[AC-wlan-ap-ap1] radio 1 type dot11an

[AC-wlan-ap-ap1-radio-1] service-template 2

[AC-wlan-ap-ap1-radio-1] radio enable

[AC-wlan-ap-ap1-radio-1] return

Verifying the configuration

# After a WLAN client passes authentication, display MAC authentication settings and statistics.

<AC>display mac-authentication interface WLAN-DBSS 0:9

MAC address authentication is enabled.

 User name format is MAC address in lowercase, like xx-xx-xx-xx-xx-xx

 Fixed username:mac

 Fixed password:not configured

          Offline detect period is 300s

          Quiet period is 180s

          Server response timeout value is 100s

          The max allowed user number is 4096 per slot

          Current user number amounts to 1

          Current domain is 2000

 

Silent MAC User info:

          MAC Addr         From Port                    Port Index

 

WLAN-DBSS0:9 is link-up

  MAC address authentication is enabled

  Authenticate success: 1, failed: 0

 Max number of on-line users is 4096

  Current online user number is 1

          MAC Addr         Authenticate State           Auth Index

          00e0-fc12-3456   MAC_AUTHENTICATOR_SUCCESS     1301

# Display online user information.

<AC> display connection

 

Index=1301,Username=00-e0-fc-12-34-56@2000

MAC=00-E0-FC-L2-34-56

IP=N/A

IPv6=N/A

Online=00h00m53s

 Total 1 connection(s) matched.

# Ping the FTP server from the client to verify that the ACL 3000 has been assigned to port WLAN-ESS 0 to deny access to the FTP server.

<AC> ping 10.0.0.1

  PING 10.0.0.1: 56  data bytes, press CTRL_C to break

    Request time out

    Request time out

    Request time out

    Request time out

    Request time out

 

  --- 10.0.0.1 ping statistics ---

    5 packet(s) transmitted

    0 packet(s) received

    100.00% packet loss

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网