Operation Manual - Security
Quidway S3500 Series Ethernet Switches Chapter 1 802.1x Configuration
Huawei Technologies Proprietary
1-5
does not permit the user to access the network resources. If the authentication flow is
passed, the port will be switched to the authorized state and permit the user to access
the network resources. This is the most common case.
1.2.3 Setting the Port Access Control Method
The following commands are used for setting 802.1x access control method on the
specified port. When no port is specified in system view, the access control method of
port is configured globally.
Perform the following configurations in system view or Ethernet port view.
Table 1-3 Setting the port access control method
Operation Command
Set port access control method
dot1x port-method { macbased |
portbased } [ interface interface-list ]
Restore the default port access
control method
undo dot1x port-method [ interface
interface-list ]
By default, 802.1x authentication method on the port is macbased. That is,
authentication is performed based on MAC addresses.
1.2.4 Checking the Users that Log on the Switch via Proxy
The following commands are used for checking the users that log on the switch via
proxy.
Perform the following configurations in system view or Ethernet port view.
Table 1-4 Checking the users that log on the switch via proxy
Operation Command
Enable the check for access
users via proxy
dot1x supp-proxy-check { logoff | trap }
[ interface interface-list ]
Cancel the check for access
users via proxy
undo dot1x supp-proxy-check { logoff |
trap } [ interface interface-list ]
These commands can be used to set on the specified interface when executed in
system view. The parameter interface-list cannot be input when the command is
executed in Ethernet Port view and it has effect only on the current interface. After
globally enabling proxy user detection and control in system view, only if you enable
this feature on a specific port can this configuration take effects on the port.