No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Configuration Guide - Security

CloudEngine 8800, 7800, 6800, and 5800 V200R005C10

This document describes the configurations of Security, including ACL, local attack defense, MFF, attack defense, traffic suppression and storm control, ARP security, Port security, DHCP snooping, ND snooping, PPPoE+, IPSG, SAVI, separating the management plane from the service plane, security risks.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
(Optional) Configuring the Authorization Mode of an Interface

(Optional) Configuring the Authorization Mode of an Interface

Context

You can configure the authorization mode for an interface to control whether an access user must pass 802.1x authentication before accessing network resources. An interface supports the following authorization modes:
  • auto: The interface is initially in unauthorized state. The interface can only send and receive only EAPoL packets, and does not allow users to access network resources. After a user is authenticated, the interface switches to the authorized state and allows the user to access network resources. This mode is recommended.

  • authorized-force: The interface is always in authorized state and allows users to access network resources without being authenticated. This mode applies to the scenario in which users on the interface are fully trusted.

  • unauthorized-force: The interface is always in unauthorized state and forbids users to access network resources. This mode applies to the scenario in which all user access rights are forbidden on the interface to ensure security.

This command can be configured in the system view or interface view. In the system view, the command can be configured on one or more interfaces; in the interface view, the command can only be configured on a specified interface.

Procedure

  • In the system view,

    1. Run system-view

      The system view is displayed.

    2. Run dot1x port-control { auto | authorized-force | unauthorized-force } interface interface-type { interface-number1 [ to interface-number2 ] } &<1-10>

      The authorization mode for an interface enabled with 802.1x authentication is configured.

      By default, the authorization mode for an interface enabled with 802.1x authentication is auto.

    3. Run commit

      The configuration is committed.

  • In the interface view,

    1. Run system-view

      The system view is displayed.

    2. Run interface interface-type interface-number

      The interface view is displayed.

    3. Run dot1x port-control { auto | authorized-force | unauthorized-force }

      The authorization mode for an interface enabled with 802.1x authentication is configured.

      By default, the authorization mode for an interface enabled with 802.1x authentication is auto.

    4. Run commit

      The configuration is committed.

Translation
Download
Updated: 2019-04-20

Document ID: EDOC1100074765

Views: 18879

Downloads: 64

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next