1-14
authentication domain for authentication, authorization, and accounting of all 802.1X users on the port.
In this way, users accessing the port cannot use any account in other domains.
Meanwhile, for EAP relay mode 802.1X authentication that uses certificates, the certificate of a user
determines the authentication domain of the user. However, you can specify different mandatory
authentication domains for different ports even if the user certificates are from the same certificate
authority (that is, the user domain names are the same). This allows you to deploy 802.1X access
policies flexibly.
Configuring 802.1X
Configuration Prerequisites
802.1X provides a user identity authentication scheme. However, 802.1X cannot implement the
authentication scheme solely by itself. RADIUS or local authentication must be configured to work with
802.1X.
z Configure the ISP domain to which the 802.1X user belongs and the AAA scheme to be used (that
is, local authentication or RADIUS).
z For remote RADIUS authentication, the username and password information must be configured
on the RADIUS server.
z For local authentication, the username and password information must be configured on the device
and the service type must be set to lan-access.
For detailed configuration of the RADIUS client, refer to AAA Configuration in the Security Volume.
Configuring 802.1X Globally
Follow these steps to configure 802.1X globally:
To do… Use the command… Remarks
Enter system view
system-view
—
Enable 802.1X globally
dot1x
Required
Disabled by default
Set the authentication method
dot1x authentication-method
{ chap | eap | pap }
Optional
CHAP by default
Set the port
access control
mode for
specified or all
ports
dot1x port-control
{ authorized-force | auto |
unauthorized-force }
[ interface interface-list ]
Optional
auto by default
Set the port
access control
method for
specified or all
ports
dot1x port-method
{ macbased | portbased }
[ interface interface-list ]
Optional
macbased by default
Set the port
access control
parameters
Set the
maximum
number of
users for
specified or all
ports
dot1x max-user user-number
[ interface interface-list ]
Optional
256 by default