No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Configuration Guide - Security

CloudEngine 8800, 7800, 6800, and 5800 V200R005C10

This document describes the configurations of Security, including ACL, local attack defense, MFF, attack defense, traffic suppression and storm control, ARP security, Port security, DHCP snooping, ND snooping, PPPoE+, IPSG, SAVI, separating the management plane from the service plane, security risks.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
(Optional) Enabling 802.1x Authentication Triggered by Unicast Packets

(Optional) Enabling 802.1x Authentication Triggered by Unicast Packets

Context

On a network where 802.1x authentication is used, if a user uses a built-in 802.1x client of a PC operating system (such as Windows XP), the user cannot enter the user name and password to trigger authentication.

To solve the problem, enable 802.1x authentication triggered by unicast packets. This function enables the device to send a unicast packet to respond to the received ARP or DHCP Request packet. After the user PC receives the unicast packet from the device, the built-in 802.1x authentication page is displayed. The user then can enter the user name and password for authentication.

Procedure

  • Enable 802.1x authentication triggered by unicast packets in the system view.
    1. Run system-view

      The system view is displayed.

    2. Run dot1x unicast-trigger interface { interface-type interface-number1 [ to interface-number2 ] } &<1-10>

      802.1x authentication triggered by unicast packets is enabled on a specified interface.

      By default, 802.1x authentication triggered by unicast packets is disabled.

    3. Run commit

      The configuration is committed.

  • Enable 802.1x authentication triggered by unicast packets in the interface view:
    1. Run system-view

      The system view is displayed.

    2. Run interface interface-type interface-number

      The interface view is displayed.

    3. Run dot1x unicast-trigger

      802.1x authentication triggered by unicast packets is enabled on the interface.

      By default, 802.1x authentication triggered by unicast packets is disabled.

    4. Run commit

      The configuration is committed.

Translation
Download
Updated: 2019-04-20

Document ID: EDOC1100074765

Views: 18827

Downloads: 64

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next