Licensing Requirements and Limitations for 802.1x Authentication
Involved Network Elements
Role |
Product Model |
Description |
---|---|---|
AAA server |
Huawei servers or third-party AAA servers. |
Performs authentication, accounting, and authorization on users. |
Licensing Requirements
802.1x is a basic function of the switch, and as such is controlled by the license for basic software functions. The license for basic software functions has been loaded and activated before delivery. You do not need to manually activate it.
Version Requirements
Product Model |
Minimum Version Required |
---|---|
CE12804/CE12808/CE12812/CE12816 |
V100R003C10 |
CE12804S/CE12808S |
V100R005C00 |
CE12804E/CE12808E/CE12816E |
V200R005C00 |
For details about the mapping between software versions and switch models, see the Hardware Query Tool.
Software version evolution: V100R001C00 -> V100R002C00 -> V100R003C00 -> V100R003C10 -> V100R005C00 -> V100R005C10 -> V100R006C00 -> V200R001C00 -> V200R002C50 -> V200R003C00 -> V200R005C00 -> V200R005C10 -> V200R019C00 -> V200R019C10
Feature Limitations
In V100R005C00 and earlier versions, 802.1x and TRILL cannot be used together. In V100R005C10 and later versions, by default, 802.1x and TRILL cannot be used together. To use both of them, run the trill adjacency-check disable command first. The TRILL function has a higher priority than 802.1x. If 802.1x is configured before TRILL, only TRILL takes effect.
- The 802.1x, MAC limit, and port security functions cannot be configured simultaneously.
- The 802.1x and MACsec cannot be configured simultaneously.
802.1x authentication on the CE12800 takes effect only on Layer 2 flows.
- In forcible unauthorization mode, users configured with static MAC addresses can still access the network normally.
- Users configured with the same MAC address cannot pass 802.1x authentication on two interfaces.
- 802.1x-enabled interfaces on the CE12800 can match MAC addresses on other interfaces. For example, when interface 1 has 802.1x enabled and interface 2 learns the source MAC address MAC1, then interface 1 can forward packets with MAC1 as the source MAC address.
Interface-based 802.1x authentication cannot be configured on Eth-Trunk member interfaces.
When using the device trigger mode, pay attention to the following points:
- The switches running V100R005C00 and earlier versions do not support the device trigger mode.
- The switches running V100R005C10 support the device multicast trigger mode after they have the patch of V100R005SPH005 or a later version installed.
- The switches running V100R006C00 and later versions support the device multicast trigger mode.
In the device multicast trigger mode, a port on the device can connect to only one 802.1x client and send untagged multicast packets.
- The switches running V200R002C50 and later versions support the device unicast trigger mode.
When using the EAP relay authentication, pay attention to the following points:
- The switches running V100R003C10 only support MD5-Challenge authentication.
- The switches running V100R005C00 support MD5-Challenge authentication and EAP-TLS authentication without certificate.
- The switches running V100R005C10 support MD5-Challenge authentication, EAP-TLS authentication without certificate, EAP-PEAP authentication, and EAP-TLS authentication with certificate after they have the patch of V100R005SPH003 or a later version installed.
- The switches running V100R006C00 and later versions support MD5-Challenge authentication, EAP-PEAP authentication, and EAP-TLS authentication.