- Table of Contents
-
- 10 Security Command Reference
- 00-Preface
- 01-AAA commands
- 02-802.1X commands
- 03-MAC authentication commands
- 04-Portal commands
- 05-Port security commands
- 06-Password control commands
- 07-Keychain commands
- 08-Public key management commands
- 09-PKI commands
- 10-IPsec commands
- 11-SSH commands
- 12-SSL commands
- 13-Attack detection and prevention commands
- 14-TCP attack prevention commands
- 15-IP source guard commands
- 16-ARP attack protection commands
- 17-ND attack defense commands
- 18-uRPF commands
- 19-MFF commands
- 20-FIPS commands
- 21-MACsec commands
- 22-802.1X client commands
- 23-Web authentication commands
- 24-Object group commands
- Related Documents
-
Title | Size | Download |
---|---|---|
03-MAC authentication commands | 153.39 KB |
display mac-authentication connection
display mac-authentication mac-address
mac-authentication access-user log enable
mac-authentication authentication-method
mac-authentication carry user-ip
mac-authentication critical vlan
mac-authentication critical vsi
mac-authentication critical-voice-vlan
mac-authentication guest-vlan auth-period
mac-authentication guest-vsi auth-period
mac-authentication offline-detect enable
mac-authentication offline-detect mac-address
mac-authentication parallel-with-dot1x
mac-authentication re-authenticate
mac-authentication re-authenticate server-unreachable keep-online
mac-authentication timer (interface view)
mac-authentication timer (system view)
mac-authentication unauthenticated-user aging enable
mac-authentication user-name-format
reset mac-authentication critical vlan
reset mac-authentication critical vsi
reset mac-authentication critical-voice-vlan
reset mac-authentication guest-vlan
reset mac-authentication guest-vsi
reset mac-authentication statistics
MAC authentication commands
display mac-authentication
Use display mac-authentication to display MAC authentication settings and statistics.
Syntax
display mac-authentication [ interface interface-type interface-number ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
interface interface-type interface-number: Specifies a port by its type and number. If the specified port is not enabled with MAC authentication, this command displays only global MAC authentication information.
Usage guidelines
If you do not specify any parameters, this command displays all MAC authentication information including the global settings, port-specific settings, MAC authentication statistics, and online user statistics.
Examples
# Display all MAC authentication settings and statistics.
<Sysname> display mac-authentication
Global MAC authentication parameters:
MAC authentication : Enabled
Authentication method : PAP
Username format : MAC address in lowercase(xxxxxxxxxxxx)
Username : mac
Password : Not configured
Offline detect period : 300 s
Quiet period : 60 s
Server timeout : 100 s
Reauth period : 3600 s
User aging period for critical VLAN : 1000 s
User aging period for critical VSI : 1000 s
User aging period for guest VLAN : 1000 s
User aging period for guest VSI : 1000 s
Authentication domain : Not configured, use default domain
Online MAC-auth wired users : 1
Silent MAC users:
MAC address VLAN ID From port Port index
0001-0000-0001 100 XGE1/1/2 21
Ten-GigabitEthernet1/1/1 is link-up
MAC authentication : Enabled
Carry User-IP : Disabled
Authentication domain : Not configured
Auth-delay timer : Enabled
Auth-delay period : 60 s
Periodic reauth : Enabled
Reauth period : 120 s
Re-auth server-unreachable : Logoff
Guest VLAN : 100
Guest VLAN auth-period : 150 s
Critical VLAN : Not configured
Critical voice VLAN : Disabled
Host mode : Multiple VLAN
Offline detection : Enabled
Authentication order : Parallel
User aging : Enabled
Guest VSI : Not configured
Guest VSI auth-period : 30 s
Critical VSI : Not configured
Max online users : 4294967295
Authentication attempts : successful 2, failed 3
Current online users : 1
MAC address Auth state
0001-0000-0000 Authenticated
0001-0000-0001 Unauthenticated
Table 1 Command output
Field |
Description |
Authentication method |
Authentication method for MAC authentication: CHAP or PAP. |
MAC authentication |
Whether MAC authentication is enabled globally. |
Username format |
User account type: MAC-based or shared. · If MAC-based accounts are used, this field displays the format settings for the username. For example, MAC address in lowercase(xxxxxxxxxxxx) indicates that the MAC address is in the hexadecimal notation without hyphens, and letters are in lower case. · If a shared account is used, this field displays Fixed account. |
Username |
Username for MAC authentication. · If MAC-based accounts are used, this field displays mac. The device uses the MAC address of each user as the username and password for MAC authentication. · If a shared account is used, this field displays the username of the shared account for MAC authentication users. By default, the username is mac. |
Password |
Password for MAC authentication. · If MAC-based accounts are used or if a shared account is used but no password is configured, this field displays Not configured. · If a shared account is used and a password is configured, this field displays a string of asterisks (******). |
Offline detect period |
Offline detect timer. |
Quiet period |
Quiet timer. |
Server timeout |
Server timeout timer. |
Reauth period |
Periodic MAC reauthentication timer in seconds. |
User aging period for critical VLAN |
Aging timer in seconds for users in critical VLANs. |
User aging period for critical VSI |
Aging timer in seconds for users in critical VSIs. |
User aging period for guest VLAN |
Aging timer in seconds for users in guest VLANs. |
User aging period for guest VSI |
Aging timer in seconds for users in guest VSIs. |
Authentication domain |
MAC authentication domain specified in system view. If no authentication domain is specified in system view, this field displays Not configured, use default domain. |
Online MAC-auth wired users |
Number of wired online MAC authentication users, including users that have passed MAC authentication and users that are performing MAC authentication. |
Silent MAC users |
Information about silent MAC addresses, including MAC addresses that have failed MAC authentication and MAC addresses that have been assigned the blackhole MAC attribute from the RADIUS server. |
MAC address |
Silent MAC address. |
VLAN ID |
ID of the VLAN to which the silent MAC address belongs. |
From port |
Name of the port that marks the MAC address as a silent MAC address. |
Port index |
Index of the port that marks the MAC address as a silent MAC address. |
Ten-GigabitEthernet1/1/1 is link-up |
Status of the link on Ten-GigabitEthernet 1/1/1. In this example, the link is up. |
MAC authentication |
Status of MAC authentication on the port: · Enabled. · Enabled (but NOT effective). This value is displayed in the following situations: ¡ The port is a Layer 2 extended-link aggregate interface that does not have member ports. ¡ MAC authentication is enabled when the device does not have ACL resources. · Disabled. |
Carry User-IP |
Whether user IP addresses are included in MAC authentication requests. |
Authentication domain |
MAC authentication domain specified for the port. |
Auth-delay timer |
Whether MAC authentication delay is enabled on the port. |
Auth-delay period |
MAC authentication delay timer. |
Periodic reauth |
Whether periodic MAC reauthentication is enabled on the port. |
Reauth period |
Periodic MAC reauthentication timer on the port. |
Re-auth server-unreachable |
Action taken when no server is reachable for MAC reauthentication: · Logoff—Logs off online MAC authentication users. · Online—Keeps MAC authenticated users online. |
Guest VLAN |
MAC authentication guest VLAN configured on the port. If no MAC authentication guest VLAN is configured, this field displays Not configured. |
Guest VLAN auth-period |
Authentication interval for users in the MAC authentication guest VLAN on the port. |
Critical VLAN |
MAC authentication critical VLAN configured on the port. If no MAC authentication critical VLAN is configured, this field displays Not configured. |
Critical voice VLAN |
Whether the MAC authentication critical voice VLAN feature is enabled on the port. |
Host mode |
· If multi-VLAN mode is disabled, this field displays Single VLAN. · If multi-VLAN mode is enabled, this field displays Multiple VLAN. |
Offline detection |
Status of MAC authentication offline detection: · Enabled. · Disabled. |
Authentication order |
If parallel processing of MAC authentication and 802.1X authentication is disabled, this field displays Default. If parallel processing of MAC authentication and 802.1X authentication is enabled, this field displays Parallel. |
User aging |
Status of the aging feature for unauthenticated MAC authentication users on a port: · Enabled. · Disabled. |
Guest VSI |
MAC authentication guest VSI configured on the port. If no MAC authentication guest VSI is configured, this field displays Not configured. |
Guest VSI auth-period |
Authentication interval for users in the MAC authentication guest VSI on the port. |
Critical VSI |
MAC authentication critical VSI configured on the port. If no MAC authentication critical VSI is configured, this field displays Not configured. |
Max online users |
Maximum number of concurrent online users allowed on the port. |
Authentication attempts: successful 1, failed 0 |
MAC authentication statistics, including the number of successful and unsuccessful authentication attempts. |
MAC address |
MAC address of the online user. |
Auth state |
User status: · Authenticated—The user has passed MAC authentication. · Unauthenticated—The user failed MAC authentication. |
display mac-authentication connection
Use display mac-authentication connection to display information about online MAC authentication users.
Syntax
display mac-authentication connection [ open ] [ interface interface-type interface-number | slot slot-number | user-mac mac-address | user-name user-name ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
open: Displays information only about MAC authentication users that use nonexistent usernames or incorrect passwords for network access in open authentication mode. If you do not specify this keyword, the command displays information about all online MAC authentication users.
interface interface-type interface-number: Specifies a port by its type and number. If you do not specify a port, this command displays information about online MAC authentication users for all ports.
slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command displays information about online MAC authentication users for all member devices.
user-mac mac-address: Specifies an online MAC authentication user by its MAC address. The mac-address argument represents the MAC address of the user, in the form of H-H-H. If you do not specify an online MAC authentication user, this command displays all online MAC authentication user information.
user-name user-name: Specifies an online MAC authentication user by its username. The user name is a case-sensitive string of 1 to 55 characters, and it can include the domain name. If you do not specify an online MAC authentication user, this command displays all online MAC authentication user information.
Examples
# Display information about all online MAC authentication users.
<Sysname> display mac-authentication connection
Total connections: 1
Slot ID: 0
User MAC address: 0015-e9a6-7cfe
Access interface: Ten-GigabitEthernet1/1/1
Username: ias
User access state: Successful
Authentication domain: macusers
IPv4 address: 192.168.1.1
IPv6 address: 2000:0:0:0:1:2345:6789:abcd
Initial VLAN: 1
Authorization untagged VLAN: 100
Authorization tagged VLAN: N/A
Authorization VSI: N/A
Authorization ACL ID: 3001
Authorization CAR: N/A
Authorization URL: N/A
Termination action: Radius-request
Session timeout period: 2 sec
Offline detection: 100 sec (server-assigned)
Online from: 2013/03/02 13:14:15
Online duration: 0h 2m 15s
Table 2 Command output
Field |
Description |
Total connections |
Total number of online MAC authentication users. |
User MAC address |
MAC address of the user. |
Access interface |
Interface through which the user accesses the device. |
User access state |
Access state of the user: · Successful—The user passes MAC authentication and comes online. · Open—The user uses a nonexistent username or an incorrect password to come online in open authentication mode. |
Authentication domain |
MAC authentication domain to which the user belongs. |
IPv4 address |
IPv4 address of the user. If no user IPv4 address is available, this field is not displayed. |
IPv6 address |
IPv6 address of the user. If no user IPv6 address is available, this field is not displayed. |
Initial VLAN |
VLAN that holds the user before MAC authentication. |
Authorization untagged VLAN |
Untagged VLAN authorized to the user. |
Authorization tagged VLAN |
Tagged VLAN authorized to the user. |
Authorization VSI |
VSI authorized to the user. |
Authorization ACL ID |
ACL authorized to the user. If the ACL authorization fails, this field displays (Not effective) after the ACL ID. |
Authorization CAR |
This field is not supported in the current software version. Authorization CAR attributes assigned by the server. If no authorization CAR attributes are assigned, this field displays N/A. |
Authorization URL |
Redirect URL authorized to the user. |
Termination action |
Action attribute assigned by the server to terminate the user session: · Default—Logs off the online authenticated user when the server-assigned session timeout timer expires. This attribute does not take effect when periodic MAC reauthentication is enabled and the periodic reauthentication timer is shorter than the server-assigned session timeout timer. · Radius-request—Reauthenticates the online user when the server-assigned session timeout timer expires, regardless of whether the periodic MAC reauthentication feature is enabled or not. If the device performs local authentication, this field displays N/A. |
Session timeout period |
Session timeout timer assigned by the server. |
Offline detection |
Offline detection setting for the user: · Ignore (command-configured)—The device does not perform offline detection for the user. The setting is configured from the CLI. · timer (command-configured)—Represents the offline detect timer. The timer is configured from the CLI, · Ignore (server-assigned)—The device does not perform offline detection for the user. The setting is assigned by a RADIUS server. · timer (server-assigned)—Represents the offline detect timer. The timer is assigned by a RADIUS server. |
Online from |
Time from which the MAC authentication user came online. |
Online duration |
Online duration of the MAC authentication user. |
display mac-authentication mac-address
Use display mac-authentication mac-address to display MAC address information of MAC authentication users in MAC authentication VLANs or VSIs of a specific type.
Syntax
display mac-authentication mac-address { critical-vlan | critical-vsi | guest-vlan | guest-vsi } [ interface interface-type interface-number ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
critical-vlan: Specifies the MAC authentication critical VLAN.
critical-vsi: Specifies the MAC authentication critical VSI.
guest-vlan: Specifies the MAC authentication guest VLAN.
guest-vsi: Specifies the MAC authentication guest VSI.
interface interface-type interface-number: Specifies a port by its type and number. If you do not specify a port, this command displays MAC address information of MAC authentication users in the specified MAC authentication VLAN or VSI on all ports.
Usage guidelines
This command displays rough statistics. It might not fully display the specified information when a large number of MAC authentication users perform authentication frequently.
Examples
# Display MAC address information of MAC authentication users in the MAC authentication guest VLAN on all ports.
<Sysname> display mac-authentication mac-address guest-vlan
Total MAC addresses: 10
Interface: Ten-GigabitEthernet1/1/1 Guest VLAN: 3 Aging time: N/A
MAC addresses: 8
0800-2700-9427 0800-2700-2341 0800-2700-2324 0800-2700-2351
0800-2700-5627 0800-2700-2251 0800-2700-8624 0800-2700-3f51
Interface: Ten-GigabitEthernet1/1/2 Guest VLAN: 5 Aging time: 30 sec
MAC addresses: 2
0801-2700-9427 0801-2700-2341
# Display MAC address information of MAC authentication users in the MAC authentication guest VSI on all ports.
<Sysname> display mac-authentication mac-address guest-vsi
Total MAC addresses: 10
Interface: Ten-GigabitEthernet1/1/3 Guest VSI: text-vsi Aging time: N/A
MAC addresses: 8
0800-2700-9427 0800-2700-2341 0800-2700-2324 0800-2700-2351
0800-2700-5627 0800-2700-2251 0800-2700-8624 0800-2700-3f51
Interface: Ten-GigabitEthernet1/1/4 Guest VSI: text1-vsi Aging time: 30 sec
MAC addresses: 2
0801-2700-9427 0801-2700-2341
Table 3 Command output
Field |
Description |
Total MAC addresses |
Total number of MAC addresses in the specified VLAN or VSI on the specified port or all ports. |
Interface |
Access port of MAC authentication users. |
Type VLAN/VSI |
VLAN or VSI information for MAC authentication users. The Type argument has the following values: · Critical VLAN. · Critical VSI. · Guest VLAN. · Guest VSI. |
Aging time |
MAC address aging time in seconds. This field displays N/A if the MAC addresses do not age out. |
MAC addresses |
Number of matching MAC addresses on a port. |
xxxx-xxxx-xxxx |
MAC address. |
Related commands
mac-authentication critical vlan
mac-authentication critical vsi
mac-authentication guest-vlan
mac-authentication guest-vsi
mac-authentication
Use mac-authentication to enable MAC authentication globally or on a port.
Use undo mac-authentication to disable MAC authentication globally or on a port.
Syntax
mac-authentication
undo mac-authentication
Default
MAC authentication is disabled globally or on any port.
Views
System view
Layer 2 Ethernet interface view
Layer 2 aggregate interface view
Predefined user roles
network-admin
Usage guidelines
To use MAC authentication on a port, you must enable the feature both globally and on the port.
Examples
# Enable MAC authentication globally.
<Sysname> system-view
[Sysname] mac-authentication
# Enable MAC authentication on Ten-GigabitEthernet 1/1/1.
<Sysname> system-view
[Sysname] interface ten-gigabitethernet 1/1/1
[Sysname-Ten-GigabitEthernet1/1/1] mac-authentication
Related commands
display mac-authentication
mac-authentication access-user log enable
Use mac-authentication access-user log enable to enable logging for MAC authentication users.
Use undo mac-authentication access-user log enable to disable logging for MAC authentication users.
Syntax
mac-authentication access-user log enable [ failed-login | logoff | successful-login ] *
undo mac-authentication access-user log enable [ failed-login | logoff | successful-login ] *
Default
All types of logging for MAC authentication users are disabled.
Views
System view
Predefined user roles
network-admin
Parameters
failed-login: Specifies logs generated for login failures of MAC authentication users.
logoff: Specifies logs generated for logoffs of MAC authentication users.
successful-login: Specifies logs generated for successful logins of MAC authentication users.
Usage guidelines
As a best practice, disable this feature to prevent excessive output of logs for MAC authentication users.
If you do not specify any parameters, this command enables all types of logging for MAC authentication users.
Examples
# Enable logging for login failures of MAC authentication users.
<Sysname> system-view
[Sysname] mac-authentication access-user log enable failed-login
Related commands
info-center source maca logfile deny (Network Management and Monitoring Command Reference)
mac-authentication authentication-method
Use mac-authentication authentication-method to specify an authentication method for MAC authentication.
Use undo mac-authentication authentication-method to restore the default.
Syntax
mac-authentication authentication-method { chap | pap }
undo mac-authentication authentication-method
Default
The device uses PAP for MAC authentication.
Views
System view
Predefined user roles
network-admin
Parameters
chap: Configures the access device to use the Challenge Handshake Authentication Protocol (CHAP) to communicate with the RADIUS server.
pap: Configures the access device to use the Password Authentication Protocol (PAP) to communicate with the RADIUS server.
Usage guidelines
RADIUS-based MAC authentication supports the following authentication methods:
· PAP—Transports usernames and passwords in plain text. The authentication method applies to scenarios that do not require high security.
· CHAP—Transports usernames in plain text and passwords in encrypted form over the network. CHAP is more secure than PAP.
Examples
# Configure the device to use CHAP for MAC authentication.
<Sysname> system-view
[Sysname] mac-authentication authentication-method chap
Related commands
mac-authentication carry user-ip
Use mac-authentication carry user-ip to include user IP addresses in MAC authentication requests sent to an IMC server.
Use undo mac-authentication carry user-ip to restore the default.
Syntax
mac-authentication carry user-ip [ exclude-ip acl acl-number ]
undo mac-authentication carry user-ip
Default
A MAC authentication request does not include the user IP address.
Views
Layer 2 Ethernet interface view
Layer 2 aggregate interface view
Predefined user roles
network-admin
Parameters
exclude-ip: Specifies an ACL-based filter to identify source IP addresses that can or cannot trigger MAC authentication.
acl acl-number: Specifies a basic ACL. The value range for the acl-number argument is 2000 to 2999.
Usage guidelines
IMPORTANT: This command can only operate in conjunction with an IMC server. |
To avoid IP conflicts that result from changes to static IP addresses, use this command on a port that has MAC authentication users that use static IP addresses.
This command adds user IP addresses to the MAC authentication requests sent to the authentication server. When MAC authentication is triggered for a user, the device checks the user's IP address for invalidity.
· If the IP address is valid, the device sends a MAC authentication request with the IP address included.
· If the IP address is not a valid host IP address or the triggering packet does not contain an IP address, the device does not initiate MAC authentication.
· If the packet is a DHCP packet with a source IP address of 0.0.0.0, the device sends a MAC authentication request without including the IP address. In this case, the IMC server does not examine the user IP address when it performs authentication.
Upon receipt of the authentication request that includes a user's IP address, the IMC server compares the user's IP and MAC addresses with its IP-MAC mappings.
· If an exact match is found or if no match is found, the user passes MAC authentication. In the latter case, the server creates an IP-MAC mapping for the user.
· If a mapping is found for the MAC address but the IP addresses do not match, the user fails the MAC authentication.
When you use this command, follow these guidelines and restrictions:
· Do not use this command in conjunction with the following features:
¡ Free VLANs for port security.
¡ MAC authentication guest VLAN or guest VSI. The device cannot perform MAC authentication for a user once that user is added to the MAC authentication guest VLAN or guest VSI.
· If the user host is configured with IPv6, the device might receive packets that contain an IPv6 link-local address, which starts with fe80. MAC authentication failure will occur if this address is used in MAC authentication. To avoid MAC authentication failure, configure a basic ACL to exclude the IPv6 IP addresses that start with fe80.
· When you configure the ACL, follow these guidelines:
¡ Use permit rules to identify source IP addresses that are valid for MAC authentication. Use deny rules to identify source IP addresses that cannot trigger MAC authentication.
¡ In the rules, only the action keyword (permit or deny) and the source IP match criterion can take effect.
¡ As a best practice, configure a deny rule to exclude the IPv6 IP addresses that start with fe80 from triggering MAC authentication.
¡ If you configure permit rules, add a deny all rule at the bottom of the ACL.
Examples
# Include user IP addresses in MAC authentication requests on Ten-GigabitEthernet 1/1/1.
<Sysname> system-view
[Sysname] interface ten-gigabitethernet 1/1/1
[Sysname-Ten-GigabitEthernet1/1/1] mac-authentication carry user-ip
# Include user IP addresses in MAC authentication requests on Ten-GigabitEthernet 1/1/1 and deny users that use IPv6 link-local addresses from performing MAC authentication on the port.
<Sysname> system-view
[Sysname] acl ipv6 basic 2000
[Sysname-acl-ipv6-basic-2000] rule deny source fe80:0::0:0 16
[Sysname-acl-ipv6-basic-2000] quit
[Sysname] interface ten-gigabitethernet 1/1/1
[Sysname-Ten-GigabitEthernet1/1/1] mac-authentication carry user-ip exclude-ip acl 2000
Related commands
mac-authentication
mac-authentication critical vlan
Use mac-authentication critical vlan to configure a MAC authentication critical VLAN on a port.
Use undo mac-authentication critical vlan to restore the default.
Syntax
mac-authentication critical vlan critical-vlan-id
undo mac-authentication critical vlan
Default
No MAC authentication critical VLAN exists on a port.
Views
Layer 2 Ethernet interface view
Layer 2 aggregate interface view
Predefined user roles
network-admin
Parameters
critical-vlan-id: Specifies a VLAN as the MAC authentication critical VLAN. The value range for the VLAN ID is 1 to 4094. Make sure the VLAN has been created.
Usage guidelines
The MAC authentication critical VLAN accommodates users that have failed MAC authentication because all the servers in their ISP domains are unreachable. Users in the critical VLAN can access network resources in the critical VLAN.
You cannot specify a VLAN as both a super VLAN and a MAC authentication critical VLAN on a port. For more information about super VLANs, see Layer 2—LAN Switching Configuration Guide.
On a port, the MAC authentication critical VLAN configuration is mutually exclusive with the MAC authentication guest VSI and MAC authentication critical VSI settings.
The critical VLAN feature takes effect when MAC authentication is performed only through RADIUS servers. If a MAC authentication user fails local authentication after RADIUS authentication, the user is not assigned to the critical VLAN.
Before you delete a VLAN that has been set as a MAC authentication critical VLAN, use the undo mac-authentication critical vlan command to remove the critical VLAN configuration.
Examples
# Configure VLAN 100 as the MAC authentication critical VLAN on Ten-GigabitEthernet 1/1/1.
<Sysname> system-view
[Sysname] interface ten-gigabitethernet 1/1/1
[Sysname-Ten-GigabitEthernet1/1/1] mac-authentication critical vlan 100
Related commands
display mac-authentication
reset mac-authentication critical vlan
mac-authentication critical vsi
Use mac-authentication critical vsi to configure a MAC authentication critical VSI on a port.
Use undo mac-authentication critical vsi to restore the default.
Syntax
mac-authentication critical vsi critical-vsi-name [ url-user-logoff ]
undo mac-authentication critical vsi
Default
No MAC authentication critical VSI exists on a port.
Views
Layer 2 Ethernet interface view
Layer 2 aggregate interface view
Predefined user roles
network-admin
Parameters
critical-vsi-name: Specifies the name of the MAC authentication critical VSI on the port, a case-sensitive string of 1 to 31 characters.
url-user-logoff: Logs off MAC authentication users that have been assigned authorization URLs on the port when the first user is assigned to the critical VSI. If you do not specify this keyword, the device keeps these MAC authentication users online until no packets are received from the users within the offline detect interval.
Usage guidelines
The MAC authentication critical VSI accommodates users that have failed MAC authentication because all the servers in their ISP domains are unreachable. Users in the critical VSI can access only network resources in the VXLAN associated with this VSI.
You can configure only one MAC authentication critical VSI on a port. The MAC authentication critical VSIs on different ports can be different.
On a port, the MAC authentication critical VSI configuration is mutually exclusive with the MAC authentication guest VLAN and MAC authentication critical VLAN settings.
Examples
# Configure VSI vpna as the MAC authentication critical VSI on Ten-GigabitEthernet 1/1/1.
<Sysname> system-view
[Sysname] interface ten-gigabitethernet 1/1/1
[Sysname-Ten-GigabitEthernet1/1/1] mac-authentication critical vsi vpna
Related commands
display mac-authentication
reset mac-authentication critical vsi
mac-authentication critical-voice-vlan
Use mac-authentication critical-voice-vlan to enable the MAC authentication critical voice VLAN feature on a port.
Use undo mac-authentication critical-voice-vlan to restore the default.
Syntax
mac-authentication critical-voice-vlan
undo mac-authentication critical-voice-vlan
Default
The MAC authentication critical voice VLAN feature is disabled on a port.
Views
Layer 2 Ethernet interface view
Layer 2 aggregate interface view
Predefined user roles
network-admin
Usage guidelines
The MAC authentication critical voice VLAN on a port accommodates MAC authentication voice users that have failed authentication because none of the RADIUS servers in their ISP domain are reachable.
Before you enable the MAC authentication critical voice VLAN feature on the port, make sure the following requirements are met:
· The port is configured with the voice VLAN.
To configure a voice VLAN on a port, use the voice-vlan enable command (see Layer 2—LAN Switching Command Reference).
· LLDP is enabled both globally and on the port.
The device uses LLDP to identify voice users. For information about LLDP commands, see Layer 2—LAN Switching Command Reference.
Examples
# Enable the MAC authentication critical voice VLAN feature on Ten-GigabitEthernet 1/1/1.
<Sysname> system-view
[Sysname] interface ten-gigabitethernet 1/1/1
[Sysname-Ten-GigabitEthernet1/1/1] mac-authentication critical-voice-vlan
Related commands
display mac-authentication
lldp enable (Layer 2—LAN Switching Command Reference)
lldp global enable (Layer 2—LAN Switching Command Reference)
reset mac-authentication critical-voice-vlan
voice-vlan enable (Layer 2—LAN Switching Command Reference)
mac-authentication domain
Use mac-authentication domain to specify a global or port-specific authentication domain.
Use undo mac-authentication domain to restore the default.
Syntax
mac-authentication domain domain-name
undo mac-authentication domain
Default
The system default authentication domain is used. For more information about the default authentication domain, see the domain default enable command in "AAA commands."
Views
System view
Layer 2 Ethernet interface view
Layer 2 aggregate interface view
Predefined user roles
network-admin
Parameters
domain-name: Specifies the name of an ISP domain, a case-insensitive string of 1 to 255 characters.
Usage guidelines
The global authentication domain applies to all MAC authentication-enabled ports. An authentication domain specified in Layer 2 Ethernet interface view or Layer 2 aggregate interface view applies only to the port. You can specify different authentication domains on different ports.
A port chooses an authentication domain for MAC authentication users in the following order:
1. Authentication domain specified on the port.
2. Global authentication domain specified in system view.
3. Default authentication domain.
Examples
# Specify ISP domain domain1 as the global MAC authentication domain.
<Sysname> system-view
[Sysname] mac-authentication domain domain1
# Specify ISP domain aabbcc as the MAC authentication domain on Ten-GigabitEthernet 1/1/1.
[Sysname] interface ten-gigabitethernet 1/1/1
[Sysname-Ten-GigabitEthernet1/1/1] mac-authentication domain aabbcc
Related commands
display mac-authentication
domain default enable
mac-authentication guest-vlan
Use mac-authentication guest-vlan to configure a MAC authentication guest VLAN on a port.
Use undo mac-authentication guest-vlan to restore the default.
Syntax
mac-authentication guest-vlan guest-vlan-id
undo mac-authentication guest-vlan
Default
No MAC authentication guest VLAN exists on a port.
Views
Layer 2 Ethernet interface view
Layer 2 aggregate interface view
Predefined user roles
network-admin
Parameters
guest-vlan-id: Specifies a VLAN as the MAC authentication guest VLAN. The value range for the VLAN ID is 1 to 4094. Make sure the VLAN has been created.
Usage guidelines
The MAC authentication guest VLAN accommodates users that have failed MAC authentication for any reason other than server unreachable. For example, the VLAN accommodates users with invalid passwords entered. You can deploy a limited set of network resources in the MAC authentication guest VLAN. For example, a software server for downloading software and system patches.
You cannot specify a VLAN as both a super VLAN and a MAC authentication guest VLAN on a port. For more information about super VLANs, see Layer 2—LAN Switching Configuration Guide.
On a port, the MAC authentication guest VLAN configuration is mutually exclusive with the MAC authentication guest VSI and MAC authentication critical VSI settings.
Before you delete a VLAN that has been set as a MAC authentication guest VLAN, use the undo mac-authentication guest-vlan command to remove the guest VLAN configuration.
Examples
# Configure VLAN 100 as the MAC authentication guest VLAN on Ten-GigabitEthernet 1/1/1.
<Sysname> system-view
[Sysname] interface ten-gigabitethernet 1/1/1
[Sysname-Ten-GigabitEthernet1/1/1] mac-authentication guest-vlan 100
Related commands
display mac-authentication
reset mac-authentication guest-vlan
mac-authentication guest-vlan auth-period
Use mac-authentication guest-vlan auth-period to set the interval at which the device authenticates users in the MAC authentication guest VLAN.
Use undo mac-authentication guest-vlan auth-period to restore the default.
Syntax
mac-authentication guest-vlan auth-period period-value
undo mac-authentication guest-vlan auth-period
Default
The device authenticates users in the MAC authentication guest VLAN every 30 seconds.
Views
Layer 2 Ethernet interface view
Layer 2 aggregate interface view
Predefined user roles
network-admin
Parameters
period-value: Sets the authentication interval for users in the MAC authentication guest VLAN. The value range is 1 to 3600, in seconds.
Examples
# Set the authentication interval to 150 seconds for users in the MAC authentication guest VLAN on Ten-GigabitEthernet 1/1/1.
<Sysname> system-view
[Sysname] interface ten-gigabitethernet 1/1/1
[Sysname-Ten-GigabitEthernet1/1/1] mac-authentication guest-vlan auth-period 150
Related commands
display mac-authentication
mac-authentication guest-vlan
mac-authentication guest-vsi
Use mac-authentication guest-vsi to configure a MAC authentication guest VSI on a port.
Use undo mac-authentication guest-vsi to restore the default.
Syntax
mac-authentication guest-vsi guest-vsi-name
undo mac-authentication guest-vsi
Default
No MAC authentication guest VSI exists on a port.
Views
Layer 2 Ethernet interface view
Layer 2 aggregate interface view
Predefined user roles
network-admin
Parameters
guest-vsi-name: Specifies the name of the MAC authentication guest VSI on the port, a case-sensitive string of 1 to 31 characters.
Usage guidelines
The MAC authentication guest VSI accommodates users that have failed MAC authentication for any reason other than server unreachable. For example, the VSI accommodates users with invalid passwords entered. You can deploy a limited set of network resources in the VXLAN that is associated with the guest VSI. For example, a software server for downloading software and system patches.
You can configure only one MAC authentication guest VSI on a port. The MAC authentication guest VSIs on different ports can be different.
On a port, the MAC authentication guest VSI configuration is mutually exclusive with the MAC authentication guest VLAN and MAC authentication critical VLAN settings.
Examples
# Configure VSI vpna as the MAC authentication guest VSI on Ten-GigabitEthernet 1/1/1.
<Sysname> system-view
[Sysname] interface ten-gigabitethernet 1/1/1
[Sysname-Ten-GigabitEthernet1/1/1] mac-authentication guest-vsi vpna
Related commands
display mac-authentication
reset mac-authentication guest-vsi
mac-authentication guest-vsi auth-period
Use mac-authentication guest-vsi auth-period to set the interval at which the device authenticates users in the MAC authentication guest VSI.
Use undo mac-authentication guest-vsi auth-period to restore the default.
Syntax
mac-authentication guest-vsi auth-period period-value
undo mac-authentication guest-vsi auth-period
Default
The device authenticates users in the MAC authentication guest VSI every 30 seconds.
Views
Layer 2 Ethernet interface view
Layer 2 aggregate interface view
Predefined user roles
network-admin
Parameters
period-value: Sets the authentication interval for users in the MAC authentication guest VSI. The value range is 1 to 3600, in seconds.
Examples
# Set the authentication interval to 150 seconds for users in the MAC authentication guest VSI on Ten-GigabitEthernet 1/1/1.
<Sysname> system-view
[Sysname] interface ten-gigabitethernet 1/1/1
[Sysname-Ten-GigabitEthernet1/1/1] mac-authentication guest-vsi auth-period 150
Related commands
display mac-authentication
mac-authentication guest-vsi
mac-authentication host-mode
Use mac-authentication host-mode multi-vlan to enable MAC authentication multi-VLAN mode on a port.
Use undo mac-authentication host-mode to restore the default.
Syntax
mac-authentication host-mode multi-vlan
undo mac-authentication host-mode
Default
MAC authentication multi-VLAN mode is disabled on a port. When the port receives a packet sourced from an authenticated MAC address in a VLAN not matching the existing MAC-VLAN mapping, the device logs off and reauthenticates the user.
Views
Layer 2 Ethernet interface view
Layer 2 aggregate interface view
Predefined user roles
network-admin
Usage guidelines
The MAC authentication multi-VLAN mode prevents an authenticated online user from service interruption caused by VLAN changes on a port. When the port receives a packet sourced from the user in a VLAN not matching the existing MAC-VLAN mapping, the device neither logs off the user nor reauthenticates the user. The device creates a new MAC-VLAN mapping for the user, and traffic transmission is not interrupted. The original MAC-VLAN mapping for the user remains on the device until it dynamically ages out. As a best practice, configure this feature on hybrid or trunk ports.
This feature improves transmission of data that is vulnerable to delay and interference. It is typically applicable to IP phone users.
Examples
# Enable MAC authentication multi-VLAN mode on Ten-GigabitEthernet 1/1/1.
<Sysname> system-view
[Sysname] interface ten-gigabitethernet 1/1/1
[Sysname-Ten-GigabitEthernet1/1/1] mac-authentication host-mode multi-vlan
Related commands
display mac-authentication
mac-authentication max-user
Use mac-authentication max-user to set the maximum number of concurrent MAC authentication users on a port.
Use undo mac-authentication max-user to restore the default.
Syntax
mac-authentication max-user max-number
undo mac-authentication max-user
Default
A port allows a maximum of 4294967295 concurrent MAC authentication users.
Views
Layer 2 Ethernet interface view
Layer 2 aggregate interface view
Predefined user roles
network-admin
Parameters
max-number: Sets the maximum number of concurrent MAC authentication users on the port. The value range for this argument is 1 to 4294967295.
Usage guidelines
Set the maximum number of concurrent MAC authentication users on a port to prevent the system resources from being overused. When the maximum number is reached, the port denies subsequent MAC authentication users.
Examples
# Configure Ten-GigabitEthernet 1/1/1 to support a maximum of 32 concurrent MAC authentication users.
<Sysname> system-view
[Sysname] interface ten-gigabitethernet 1/1/1
[Sysname-Ten-GigabitEthernet1/1/1] mac-authentication max-user 32
Related commands
display mac-authentication
mac-authentication offline-detect enable
Use mac-authentication offline-detect enable to enable MAC authentication offline detection on a port.
Use undo mac-authentication offline-detect enable to disable MAC authentication offline detection.
Syntax
mac-authentication offline-detect enable
undo mac-authentication offline-detect enable
Default
MAC authentication offline detection is enabled on a port.
Views
Layer 2 Ethernet interface view
Layer 2 aggregate interface view
Predefined user roles
network-admin
Usage guidelines
This command allows the device to log off a user if the device does not receive any packets from that user within an offline detect interval. In addition, the device requests the accounting server to stop accounting for that user. To set the offline detect timer, use the mac-authentication timer command.
The undo mac-authentication offline-detect enable command disables the device from inspecting the online user status.
Examples
# Disable MAC authentication offline detection on Ten-GigabitEthernet 1/1/1.
<Sysname> system-view
[Sysname] interface ten-gigabitethernet 1/1/1
[Sysname-Ten-GigabitEthernet1/1/1] undo mac-authentication offline-detect enable
Related commands
mac-authentication timer
mac-authentication offline-detect mac-address
Use mac-authentication offline-detect mac-address to configure MAC authentication offline detection for a MAC authentication user.
Use undo mac-authentication offline-detect mac-address to restore the default.
Syntax
mac-authentication offline-detect mac-address mac-address { ignore | timer offline-detect-value [ check-arp-or-nd-snooping ] }
undo mac-authentication offline-detect mac-address mac-address
Default
The offline detection settings configured on access ports take effect and the offline detect timer set in system view is used.
Views
System view
Predefined user roles
network-admin
Parameters
mac-address: Specifies a MAC address in the format of H-H-H, excluding multicast, all-zero, and all-F MAC addresses.
ignore: Skips offline detection for the specified user.
timer offline-detect-value: Specifies the offline detect timer for the specified user. The value range is 60 to 2147483647 seconds.
check-arp-or-nd-snooping: Uses the ARP snooping or ND snooping table in offline detection to determine the offline state of the user.
Usage guidelines
Use this command to set offline detection parameters specific to a MAC authentication user. To have this command take effect, you must make sure MAC authentication offline detection is enabled on the user's access port. The user-specific offline detection settings take effect on the online users immediately after they are configured.
Use this command as follows:
· Set an offline detect timer specific to a user and control whether to use the ARP snooping or ND snooping table to determine the offline state of the user.
¡ If the ARP snooping or ND snooping table is used, the device searches the ARP snooping or ND snooping table before it checks for traffic from the user within the detection interval. If a matching ARP snooping or ND snooping entry is found, the device resets the offline detect timer and the user stays online. If the offline detect timer expires because the device has not found a matching snooping entry for the user or received traffic from the user, the device disconnects the user.
¡ If the ARP or ND snooping table is not used, the device disconnects the user if it has not received traffic from that user before the offline detect timer expires.
When disconnecting the user, the device also notifies the RADIUS server (if any) to stop user accounting.
· Skip offline detection for the user. You can choose this option if the user is a dumb terminal. A dumb terminal might fail to come online again after it is logged off by the offline detection feature.
The device uses the offline detection settings for a user in the following sequence:
1. User-specific offline detection settings.
2. Offline detection settings assigned to the user by the RADIUS server. The settings include the offline detect timer, use of the ARP or ND snooping table in offline detection, and whether to ignore offline detection.
3. Port-based offline detection settings.
Examples
# Disable MAC authentication offline detection for the MAC authentication user with MAC address 000a-eb29-7511.
<Sysname> system-view
[Sysname] mac-authentication offline-detect mac-address 000a-eb29-7511 ignore
# Enable MAC authentication offline detection for the MAC authentication user with MAC address 000a-eb29-7511, and set the offline detect timer to 24 hours.
<Sysname> system-view
[Sysname] mac-authentication offline-detect mac-address 000a-eb29-7511 timer 86400
Related commands
display mac-authentication connection
mac-authentication offline-detect enable
mac-authentication timer (system view)
mac-authentication parallel-with-dot1x
Use mac-authentication parallel-with-dot1x to enable parallel processing of MAC authentication and 802.1X authentication on a port.
Use undo mac-authentication parallel-with-dot1x to restore the default.
Syntax
mac-authentication parallel-with-dot1x
undo mac-authentication parallel-with-dot1x
Default
Parallel processing of MAC authentication and 802.1X authentication is disabled on a port.
Views
Layer 2 Ethernet interface view
Layer 2 aggregate interface view
Predefined user roles
network-admin
Usage guidelines
When you configure this command on a port, follow these restrictions and guidelines:
· Make sure the port meets the following requirements:
¡ The port is configured with both 802.1X authentication and MAC authentication and performs MAC-based access control for 802.1X authentication.
¡ The port is enabled with the 802.1X unicast trigger.
· For the port to perform MAC authentication before it is assigned to the 802.1X guest VLAN or guest VSI, use the dot1x guest-vlan-delay new-mac or dot1x guest-vsi-delay new-mac command to delay assigning the port to the 802.1X guest VLAN or guest VSI.
For information about the dot1x guest-vlan-delay new-mac or dot1x guest-vsi-delay new-mac command, see "802.1X commands."
· Do not enable MAC authentication delay on the port. This operation will delay MAC authentication after 802.1X authentication is triggered.
· To configure both 802.1X authentication and MAC authentication on the port, use one of the following methods:
¡ Enable the 802.1X and MAC authentication features separately on the port.
¡ Enable port security on the port. The port security mode must be userlogin-secure-or-mac or userlogin-secure-or-mac-ext.
For information about port security mode configuration, see port security in Security Configuration Guide.
Examples
# Enable parallel processing of MAC authentication and 802.1X authentication on Ten-GigabitEthernet 1/1/1.
<Sysname> system-view
[Sysname] interface ten-gigabitethernet 1/1/1
[Sysname-Ten-GigabitEthernet1/1/1] mac-authentication parallel-with-dot1x
Related commands
display mac-authentication
mac-authentication re-authenticate
Use mac-authentication re-authenticate to enable the periodic MAC reauthentication feature on a port.
Use undo mac-authentication re-authenticate to disable the periodic MAC reauthentication feature on a port.
Syntax
mac-authentication re-authenticate
undo mac-authentication re-authenticate
Default
The periodic MAC reauthentication feature is disabled on a port.
Views
Layer 2 Ethernet interface view
Layer 2 aggregate interface view
Predefined user roles
network-admin
Usage guidelines
Periodic MAC reauthentication enables the access device to periodically authenticate online MAC authentication users on a port. This feature tracks the connection status of online users and updates the authorization attributes assigned by the server, such as the ACL and VLAN.
To set the periodic reauthentication timer, use the mac-authentication timer reauth-period command in system view or in Ethernet interface view.
Examples
# Enable the periodic MAC reauthentication feature on Ten-GigabitEthernet 1/1/1 and set the global periodic reauthentication timer to 1800 seconds.
<Sysname> system-view
[Sysname] mac-authentication timer reauth-period 1800
[Sysname] interface ten-gigabitethernet 1/1/1
[Sysname-Ten-GigabitEthernet1/1/1] mac-authentication re-authenticate
Related commands
display mac-authentication
mac-authentication timer
mac-authentication re-authenticate server-unreachable keep-online
Use mac-authentication re-authenticate server-unreachable keep-online to enable the keep-online feature on a port.
Use undo mac-authentication re-authenticate server-unreachable to restore the default.
Syntax
mac-authentication re-authenticate server-unreachable keep-online
undo mac-authentication re-authenticate server-unreachable
Default
The keep-online feature is disabled on a port. The device logs off online MAC authentication users if no server is reachable for MAC reauthentication.
Views
Layer 2 Ethernet interface view
Layer 2 aggregate interface view
Predefined user roles
network-admin
Usage guidelines
The keep-online feature keeps authenticated MAC authentication users online when no server is reachable for MAC reauthentication.
Examples
# Enable the keep-online feature for authenticated MAC authentication users on Ten-GigabitEthernet 1/1/1.
<Sysname> system-view
[Sysname] interface ten-gigabitethernet 1/1/1
[Sysname-Ten-GigabitEthernet1/1/1] mac-authentication re-authenticate server-unreachable keep-online
Related commands
display mac-authentication
mac-authentication timer (interface view)
Use mac-authentication timer to configure a MAC authentication timer on a port.
Use undo mac-authentication timer to restore the default of a MAC authentication timer.
Syntax
mac-authentication timer { auth-delay auth-delay-time | reauth-period reauth-period-value }
undo mac-authentication timer { auth-delay | reauth-period }
Default
No MAC authentication delay timer is set on a port. MAC authentication delay is disabled. MAC authentication starts immediately after it is triggered by a user packet.
No periodic MAC reauthentication timer is set on a port. The port uses the global periodic MAC reauthentication timer.
Views
Layer 2 Ethernet interface view
Layer 2 aggregate interface view
Predefined user roles
network-admin
Parameters
auth-delay auth-delay-time: Sets the delay time for MAC authentication in seconds. The value range is 1 to 180.
reauth-period reauth-period-value: Sets the port-specific periodic MAC reauthentication timer in seconds. The value range is 60 to 7200.
Usage guidelines
When both 802.1X authentication and MAC authentication are enabled on a port, you can delay MAC authentication so that 802.1X authentication is preferentially triggered. If no 802.1X authentication is triggered or if 802.1X authentication fails within the delay period, the port continues to process MAC authentication.
Do not set the port security mode to mac-else-userlogin-secure or mac-else-userlogin-secure-ext when you want to use MAC authentication delay. The delay does not take effect on a port in either of the two modes. For more information about port security modes, see "Port security commands."
The device reauthenticates online MAC authentication users on a port at the specified periodic reauthentication interval if the port is enabled with periodic MAC reauthentication. To enable periodic MAC reauthentication on a port, use the mac-authentication re-authenticate command.
A change to the port-specific periodic reauthentication timer applies to online users only after the old timer expires.
The device selects a periodic reauthentication timer for MAC reauthentication in the following order:
1. Server-assigned reauthentication timer.
2. Port-specific reauthentication timer.
3. Global reauthentication timer.
4. Default reauthentication timer.
Examples
# Enable MAC authentication delay on Ten-GigabitEthernet 1/1/1 and set the delay time to 10 seconds.
<Sysname> system-view
[Sysname] interface ten-gigabitethernet 1/1/1
[Sysname-Ten-GigabitEthernet1/1/1] mac-authentication timer auth-delay 10
Related commands
display mac-authentication
port-security port-mode
mac-authentication timer (system view)
Use mac-authentication timer to configure a MAC authentication timer.
Use undo mac-authentication timer to restore the default of a MAC authentication timer.
Syntax
mac-authentication timer { offline-detect offline-detect-value | quiet quiet-value | reauth-period reauth-period-value | server-timeout server-timeout-value | user-aging { critical-vlan | critical-vsi | guest-vlan | guest-vsi } aging-time-value }
undo mac-authentication timer { offline-detect | quiet | reauth-period | server-timeout | user-aging { critical-vlan | critical-vsi | guest-vlan | guest-vsi } }
Default
The following MAC authentication timers apply:
· The offline detect timer is 300 seconds.
· The quiet timer is 60 seconds.
· The global periodic MAC reauthentication timer is 3600 seconds.
· The server timeout timer is 100 seconds.
· User aging timer for a type of MAC authentication VLAN or VSI: 1000 seconds.
Views
System view
Predefined user roles
network-admin
Parameters
offline-detect offline-detect-value: Sets the offline detect timer. The value range is 60 to 2147483647 seconds.
quiet quiet-value: Sets the quiet timer. The value range is 1 to 3600 seconds.
reauth-period reauth-period-value: Sets the global periodic MAC reauthentication timer. The value range is 60 to 7200 seconds.
server-timeout server-timeout-value: Sets the server timeout timer. The value range is 100 to 300 seconds.
user-aging: Sets the user aging timer for a type of MAC authentication VLAN or VSI.
critical-vlan: Specifies MAC authentication critical VLANs.
critical-vsi: Specifies MAC authentication critical VSIs.
guest-vlan: Specifies MAC authentication guest VLANs.
guest-vsi: Specifies MAC authentication guest VSIs.
aging-time-value: Sets the user aging timer. The value range is 60 to 2147483647 seconds.
Usage guidelines
MAC authentication uses the following timers:
· Offline detect timer—Sets the interval that the device waits for traffic from a user before the device determines that the user is idle. If the device has not received traffic from a user before the timer expires, the device logs off that user and requests the accounting server to stop accounting for the user. This timer takes effect only when the MAC authentication offline detection feature is enabled.
As a best practice, set the MAC address aging timer to the same value as the offline detect timer. This operation prevents a MAC authenticated user from being logged off within the offline detect interval because of MAC address entry expiration.
· Quiet timer—Sets the interval that the device must wait before the device can perform MAC authentication for a user that has failed MAC authentication. All packets from the MAC address are dropped during the quiet time. This quiet mechanism prevents repeated authentication from affecting system performance.
· Periodic MAC reauthentication timer—Sets the interval at which the device reauthenticates online MAC authentication users on a port if the port is enabled with periodic MAC reauthentication. A change to the global periodic reauthentication timer applies to online users only after the old timer expires.
· Server timeout timer—Sets the interval that the device waits for a response from a RADIUS server before the device determines that the RADIUS server is unavailable. If the timer expires during MAC authentication, the user fails MAC authentication.
· User aging timer (user-aging)—Sets the user aging timer for a type of MAC authentication VLAN or VSI.
If you enable user aging for unthenticated MAC authentication user, you can set a user aging timer for MAC authentication critical or guest VLANs or VSIs. The user aging timer for a type of MAC authentication VLAN or VSI determines how long a user can stay in that type of VLAN or VSI.
For more information about how user aging operates, see the usage guidelines for the mac-authentication unauthenticated-user aging enable command.
Do not set the user aging timer for users in MAC authentication guest VLANs or VSIs to an integral multiple of the authentication interval for them. If you do so, the aging timer will not take effect. The authentication interval for MAC authentication users in a guest VLAN or VSI is configurable with the mac-authentication guest-vlan auth-period command or the mac-authentication guest-vsi auth-period command, respectively
Examples
# Set the server timeout timer to 150 seconds.
<Sysname> system-view
[Sysname] mac-authentication timer server-timeout 150
Related commands
display mac-authentication
mac-authentication guest-vlan auth-period
mac-authentication guest-vsi auth-period
mac-authentication unauthenticated-user aging enable
mac-authentication unauthenticated-user aging enable
Use mac-authentication unauthenticated-user aging enable to enable user aging for unauthenticated MAC authentication users.
Use undo mac-authentication unauthenticated-user aging enable to disable user aging for unauthenticated MAC authentication users.
Syntax
mac-authentication unauthenticated-user aging enable
undo mac-authentication unauthenticated-user aging enable
Default
User aging is enabled for unauthenticated MAC authentication users.
Views
Layer 2 Ethernet interface view
Layer 2 aggregate interface view
Predefined user roles
network-admin
Usage guidelines
User aging for unauthenticated MAC authentication users applies to users added to a MAC authentication guest or critical VLAN or VSI because they have not been authenticated or have failed authentication.
When a user in one of those VLANs or VSIs ages out, the device removes the user from the VLAN or VSI and deletes the MAC address entry for the user from the access port.
For users in one of those VLANs or VSIs on one port to be authenticated successfully and come online on another port, enable this feature. In any other scenarios, disable this feature as a best practice.
Examples
# Disable user aging for unauthenticated MAC authentication users on Ten-GigabitEthernet 1/1/1.
<Sysname> system-view
[Sysname] interface ten-gigabitethernet 1/1/1
[Sysname-Ten-GigabitEthernet1/1/1] undo mac-authentication unauthenticated-user aging enable
Related commands
mac-authentication timer
mac-authentication user-name-format
Use mac-authentication user-name-format to configure the type of user accounts for MAC authentication users.
Use undo mac-authentication user-name-format to restore the default.
Syntax
mac-authentication user-name-format { fixed [ account name ] [ password { cipher | simple } string ] | mac-address [ { with-hyphen | without-hyphen } [ lowercase | uppercase ] ] }
undo mac-authentication user-name-format
Default
Each user's MAC address is used as the username and password for MAC authentication. A MAC address is in the hexadecimal notation without hyphens, and letters are in lower case.
Views
System view
Predefined user roles
network-admin
Parameters
fixed: Uses a shared account for all MAC authentication users.
account name: Specifies the username for the shared account. The name is a case-sensitive string of 1 to 55 characters, excluding the at sign (@). If you do not specify a username, the default name mac applies.
password: Specifies the password for the shared user account.
cipher: Specifies a password in encrypted form.
simple: Specifies a password in plaintext form. For security purposes, the password specified in plaintext form will be stored in encrypted form.
string: Specifies the password. Its plaintext form is a case-sensitive string of 1 to 63 characters. Its encrypted form is a case-sensitive string of 1 to 117 characters.
mac-address: Uses MAC-based user accounts for MAC authentication users. You can also specify the format of username and password by using the following keywords:
· with-hyphen: Includes hyphens in the MAC address, for example xx-xx-xx-xx-xx-xx.
· without-hyphen: Excludes hyphens from the MAC address, for example, xxxxxxxxxxxx.
· lowercase: Specifies letters in lower case.
· uppercase: Specifies letters in upper case.
Usage guidelines
If you specify the MAC-based user account, the device uses the MAC address of a user as the username and password for MAC authentication of the user. This user account type ensures high authentication security. However, you must create on the authentication server a user account for each user, using the MAC address of the user as both the username and password.
If you specify a shared user account, the device uses the specified username and password for MAC authentication of all users. Because all MAC authentication users use a single account for authentication, you only need to create one account on the authentication server. This user account type is suitable for trusted networks.
Examples
# Configure a shared account for MAC authentication users, and set the username to abc and password to plaintext string of xyz.
<Sysname> system-view
[Sysname] mac-authentication user-name-format fixed account abc password simple xyz
# Use MAC-based user accounts for MAC authentication users. Each MAC address must be in the hexadecimal notation with hyphens, and letters are in upper case.
<Sysname> system-view
[Sysname] mac-authentication user-name-format mac-address with-hyphen uppercase
display mac-authentication
reset mac-authentication critical vlan
Use reset mac-authentication critical vlan to remove users from the MAC authentication critical VLAN on a port.
Syntax
reset mac-authentication critical vlan interface interface-type interface-number [ mac-address mac-address ]
Views
User view
Predefined user roles
network-admin
Parameters
interface interface-type interface-number: Specifies a port by its type and number.
mac-address mac-address: Specifies a user by its MAC address. If you do not specify this option, the command removes all users from the MAC authentication critical VLAN on the port.
Examples
# Remove the user with MAC address 1-1-1 from the MAC authentication critical VLAN on Ten-GigabitEthernet 1/1/1.
<Sysname> reset mac-authentication critical vlan interface ten-gigabitethernet 1/1/1 mac-address 1-1-1
Related commands
display mac-authentication
mac-authentication critical vlan
reset mac-authentication critical vsi
Use reset mac-authentication critical vsi to remove users from the MAC authentication critical VSI on a port.
Syntax
reset mac-authentication critical vsi interface interface-type interface-number [ mac-address mac-address ]
Views
User view
Predefined user roles
network-admin
Parameters
interface interface-type interface-number: Specifies a port by its type and number.
mac-address mac-address: Specifies a user by its MAC address. If you do not specify this option, the command removes all users from the MAC authentication critical VSI on the port.
Examples
# Remove the user with MAC address 1-1-1 from the MAC authentication critical VSI on Ten-GigabitEthernet 1/1/1.
<Sysname> reset mac-authentication critical vsi interface ten-gigabitethernet 1/1/1 mac-address 1-1-1
Related commands
display mac-authentication
mac-authentication critical vsi
reset mac-authentication critical-voice-vlan
Use reset mac-authentication critical-voice-vlan to remove MAC authentication users from the MAC authentication critical voice VLAN on a port.
Syntax
reset mac-authentication critical-voice-vlan interface interface-type interface-number [ mac-address mac-address ]
Views
User view
Predefined user roles
network-admin
Parameters
interface interface-type interface-number: Specifies a port by its type and number.
mac-address mac-address: Specifies a user by its MAC address. If you do not specify this option, the command removes all users from the MAC authentication critical voice VLAN on the port.
Examples
# Remove the user with MAC address 1-1-1 from the MAC authentication critical voice VLAN on Ten-GigabitEthernet 1/1/1.
<Sysname> reset mac-authentication critical-voice-vlan interface ten-gigabitethernet 1/1/1 mac-address 1-1-1
Related commands
display mac-authentication
mac-authentication critical-voice-vlan
reset mac-authentication guest-vlan
Use reset mac-authentication guest-vlan to remove users from the MAC authentication guest VLAN on a port.
Syntax
reset mac-authentication guest-vlan interface interface-type interface-number [ mac-address mac-address ]
Views
User view
Predefined user roles
network-admin
Parameters
interface interface-type interface-number: Specifies a port by its type and number.
mac-address mac-address: Specifies a user by its MAC address. If you do not specify this option, the command removes all users from the MAC authentication guest VLAN on the port.
Examples
# Remove the user with MAC address 1-1-1 from the MAC authentication guest VLAN on Ten-GigabitEthernet 1/1/1.
<Sysname> reset mac-authentication guest-vlan interface ten-gigabitethernet 1/1/1 mac-address 1-1-1
Related commands
display mac-authentication
mac-authentication guest-vlan
reset mac-authentication guest-vsi
Use reset mac-authentication guest-vsi to remove users from the MAC authentication guest VSI on a port.
Syntax
reset mac-authentication guest-vsi interface interface-type interface-number [ mac-address mac-address ]
Views
User view
Predefined user roles
network-admin
Parameters
interface interface-type interface-number: Specifies a port by its type and number.
mac-address mac-address: Specifies a user by its MAC address. If you do not specify this option, the command removes all users from the MAC authentication guest VSI on the port.
Examples
# Remove the user with MAC address 1-1-1 from the MAC authentication guest VSI on Ten-GigabitEthernet 1/1/1.
<Sysname> reset mac-authentication guest-vsi interface ten-gigabitethernet 1/1/1 mac-address 1-1-1
Related commands
display mac-authentication
mac-authentication guest-vsi
reset mac-authentication statistics
Use reset mac-authentication statistics to clear MAC authentication statistics.
Syntax
reset mac-authentication statistics [ interface interface-type interface-number ]
Views
User view
Predefined user roles
network-admin
Parameters
interface interface-type interface-number: Specifies a port by its type and number. If you do not specify a port, this command clears both global and port-specific MAC authentication statistics.
Examples
# Clear MAC authentication statistics on Ten-GigabitEthernet 1/1/1.
<Sysname> reset mac-authentication statistics interface ten-gigabitethernet 1/1/1
Related commands
display mac-authentication