1-5
Table 1-3
Configure a Guest VLAN
Operation
Command
Description
Enter system view
system-view
—
Enter Ethernet port view
interface interface-type
interface-number
—
Configure the Guest VLAN for
the current port
mac-authentication
guest-vlan vlan-id
Required
By default, no Guest VLAN is
configured for a port by default.
Return to system view
quit
—
Configure the interval at which
the switch re-authenticates
users in Guest VLANs
mac-authentication timer
guest-vlan-reauth interval
Optional
By default, the switch
re-authenticates the users in
Guest VLANs at the interval of
30 seconds by default.
z
If more than one client are connected to a port, you cannot configure a Guest VLAN for this port.
z
When a Guest VLAN is configured for a port, only one MAC address authentication user can
access the port. Even if you set the limit on the number of MAC address authentication users to
more than one, the configuration does not take effect.
z
The undo vlan command cannot be used to remove the VLAN configured as a Guest VLAN. If you
want to remove this VLAN, you must remove the Guest VLAN configuration for it. Refer to the
VLAN module in this manual for the description on the undo vlan command.
z
Only one Guest VLAN can be configured for a port, and the VLAN configured as the Guest VLAN
must be an existing VLAN. Otherwise, the Guest VLAN configuration does not take effect. If you
want to change the Guest VLAN for a port, you must remove the current Guest VLAN and then
configure a new Guest VLAN for this port.
z
802.1x authentication cannot be enabled for a port configured with a Guest VLAN.
z
The Guest VLAN function for MAC authentication does not take effect when port security is
enabled.
Configuring the Maximum Number of MAC Address Authentication Users Allowed to
Access a Port
You can configure the maximum number of MAC address authentication users for a port in order to
control the maximum number of users accessing a port. After the number of access users has
exceeded the configured maximum number, the switch will not trigger MAC address authentication for
subsequent access users, and thus these subsequent access users cannot access the network
normally.