3Com Switch 8800 Configuration Guide
Chapter 39 802.1x Configuration
39-6
auto
(automatic identification mode, which is also called protocol control mode). That is,
the initial state of the port is unauthorized. It only permits EAPoL packets
receiving/transmitting and does not permit the user to access the network resources. If
the authentication flow is passed, the port will be switched to the authorized state and
permit the user to access the network resources.
The
authorized-force
keyword specifies the port to operate in authorized-force mode.
Ports in this mode are always authorized. Users can access a network through this kind
of port without being authorized.
The
unauthorized-force
keyword specifies the port to operate in unauthorized-force
mode. Ports in this mode are always unauthorized. They do not respond to
authorization requests. Users cannot access a network through this kind of port.
By default, the mode of 802.1x performing access control on the port is
auto
(automatic
identification mode).
39.2.3 Setting Port Access Control Method
The following commands are used for setting 802.1x access control method on the
specified port. When no port is specified in system view, the access control method of
all ports is configured.
Perform the following configuration in system view or Ethernet port view.
Table 39-3
Set port access control method
Operation
Command
Set port access control method
dot1x
port-method
{
macbased
|
portbased
} [
interface
interface
-
list
]
Restore the default port access
control method
undo
dot1x
port-method
[
interface
interface
-
list
]
The
macbased
keyword specifies to authenticate each user accessing through the
port. And disconnection of a user does not affect other users. Whereas if you specify
the
portbased
keyword, users can access a network without being authenticated if a
user passes the authentication previously. But these users are denied when the one
who passes the authentication first goes offline.
By default, 802.1x authentication method on the port is
macbased
. That is,
authentication is performed based on MAC addresses.