
268
C
HAPTER
11: 802.1
X
C
ONFIGURATION
5
Set the IP address of the secondary authentication/accounting RADIUS servers.
[SW5500-radius-radius1]
secondary authentication 10.11.1.2
[SW5500-radius-radius1]
secondary accounting 10.11.1.1
6
Set the encryption key when the system exchanges packets with the
authentication RADIUS server.
[SW5500-radius-radius1]
key authentication name
7
Set the encryption key when the system exchanges packets with the accounting
RADIUS server.
[SW5500-radius-radius1]
key accounting money
8
Set the timeouts and times for the system to retransmit packets to the RADIUS
server.
[SW5500-radius-radius1]
timer 5
[SW5500-radius-radius1]
retry 5
9
Set the interval for the system to transmit real-time accounting packets to the
RADIUS server.
[SW5500-radius-radius1]
timer realtime-accounting 15
10
Configure the system to transmit the user name to the RADIUS server after
removing the domain name.
[SW5500-radius-radius1]
user-name-format without-domain
[SW5500-radius-radius1]
quit
11
Create the user domain 3com163.net and enters isp configuration mode.
[SW5500]
domain 3com163.net
12
Specify radius1 as the RADIUS scheme for the users in the domain 3com163.net.
[SW5500-isp-3com163.net]
scheme radius-scheme radius1 local
13
Set a limit of 30 users to the domain 3com163.net.
[SW5500-isp-3com163.net]
access-limit enable 30
14
Enable idle cut function for the user and set the idle cut parameter in the domain
3com163.net.
[SW5500-isp-3com163.net]
idle-cut enable 20 2000
15
Add a local user and sets its parameter.
[SW5500]
local-user localuser
[SW5500-luser-localuser]
service-type lan-access
[SW5500-luser-localuser]
password simple localpass
16
Enable the 802.1x globally.
[SW5500]
dot1x
Centralized MAC
Address
Authentication
Configuration
Centralized MAC
Address Authentication
Overview
Centralized MAC address authentication is a type of authentication method that
controls the user network access rights using the port and MAC address. It
requires no client software for the user and uses the user‘s MAC address as the
Summary of Contents for SuperStack 4
Page 6: ...18 ABOUT THIS GUIDE ...
Page 34: ...46 CHAPTER 1 GETTING STARTED ...
Page 62: ...74 CHAPTER 3 VLAN OPERATION ...
Page 69: ...PoE Configuration 81 ...
Page 70: ...82 CHAPTER 4 POWER OVER ETHERNET POE CONFIGURATION ...
Page 98: ...110 CHAPTER 5 NETWORK PROTOCOL OPERATION ...
Page 220: ...232 CHAPTER 8 ACL CONFIGURATION ...
Page 408: ...420 CHAPTER B RADIUS SERVER AND RADIUS CLIENT SETUP ...
Page 432: ...444 APPENDIX D 3COM XRN ...