Configuration Guide Configuring 802.1X
dot1x event server-invalid action
bypass-wlan
Configures the bypass WLAN for the
RADIUS server.
Configures 802.1X authentication for
encryption only when 802.1X and Web
authentication are both enabled.
Limits the rate of printing online and offline
logs.
Enables traffic detection on users in WLAN.
Enables SNMP trap during online and
offline.
4.4.1 Configuring 802.1X Basic Functions
Configuration Effect
Enable basic authentication and accounting services.
On a WLAN, if the WLAN security mode is WPA or WPA2 and 802.1X authentication is enabled, STAs can access the
network only after passing 802.1X authentication.
Run the radius-server host ip-address command to configure the IP address and port information of the RADIUS
server and the radius-server key command to configure the RADIUS communication key between the NAS and the
RADIUS server to ensure secure communication.
Run the aaa accounting update command in global configuration mode to enable accounting update and the aaa
accounting update interval command on the NAS to configure the accounting update interval. If the RADIUS server
supports accounting update, you can also configure it on the RADIUS server. Prefer to use the parameters assigned by
the authentication server than the parameters configured on the NAS.
Notes
Configure accurate RADIUS parameters so that the basic RADIUS communication is proper.
The 802.1X authentication method list and accounting method list must be configured in AAA. Otherwise, errors may
occur during authentication and accounting.
802.1X uses the default method list by default. If the default method list is not configured for AAA, run the dot1x
authentication and dot1x accounting commands to reconfigure the it.
When RG-SAM/SMP is used, accounting must be enabled. Otherwise, the RADIUS server will fail to detect users going
offline, causing offline users remaining in the online user table.