CLI Reference Web Authentication Configuration Commands
Example 2: Do not redirect users’ HTTP requests with port 80.
Ruijie(config)# no http redirect port 80
View the HTTP redirection configuration.
http redirect session-limit
This command is used to set the total number of HTTP sessions that can be originated by an
unauthenticated user, or the maximum number of HTTP sessions that can be originated by an
unauthenticated user connected to each port. The no form of this command is used to recover the
maximum number of HTTP sessions that can be originated by an unauthenticated user to 3.
http redirect session-limit session-num [ port port-session-num ]
no http redirect session-limit
Total number of HTTP sessions that can be originated by an
unauthenticated user. It is in the range of 1 to 255.
The maximum number of HTTP sessions that can be originated by an
unauthenticated user connected to each port. It is in the range of 1 to
65535.
Totally 255 HTTP sessions can be originated by an unauthenticated user, and 300 HTTP sessions
that can be originated by an unauthenticated user connected to each port.
Global configuration mode
To prevent HTTP attacks caused by unauthenticated users from using up the TCP connections of the
access device, the maximum number of HTTP sessions by unauthenticated users must be limited on
the access device.
In addition to authentication, other programs may also occupy HTTP sessions. Therefore, it is not
recommended that the maximum number of HTTP sessions by unauthenticated users be 1
Example 1: Set the maximum number of HTTP sessions originated by an unauthenticated user to 4.
Ruijie(config)# http redirect session-limit 4
View the HTTP redirection configuration.