(Optional) Configuring the Authorization Mode of an Interface
Context
auto: The interface is initially in unauthorized state. The interface can only send and receive only EAPoL packets, and does not allow users to access network resources. After a user is authenticated, the interface switches to the authorized state and allows the user to access network resources. This mode is recommended.
authorized-force: The interface is always in authorized state and allows users to access network resources without being authenticated. This mode applies to the scenario in which users on the interface are fully trusted.
unauthorized-force: The interface is always in unauthorized state and forbids users to access network resources. This mode applies to the scenario in which all user access rights are forbidden on the interface to ensure security.
This command can be configured in the system view or interface view. In the system view, the command can be configured on one or more interfaces; in the interface view, the command can only be configured on a specified interface.
Procedure
- In the system view,
- Run system-view
The system view is displayed.
- Run dot1x port-control { auto | authorized-force | unauthorized-force } interface interface-type { interface-number1 [ to interface-number2 ] } &<1-10>
The authorization mode for an interface enabled with 802.1x authentication is configured.
By default, the authorization mode for an interface enabled with 802.1x authentication is auto.
- Run commit
The configuration is committed.
- Run system-view
- In the interface view,
- Run system-view
The system view is displayed.
- Run interface interface-type interface-number
The interface view is displayed.
- Run dot1x port-control { auto | authorized-force | unauthorized-force }
The authorization mode for an interface enabled with 802.1x authentication is configured.
By default, the authorization mode for an interface enabled with 802.1x authentication is auto.
- Run commit
The configuration is committed.
- Run system-view