RADIUS Configuration Task List
251
can access after login is determined by the privilege level of the user. For SSH
users using RSA shared key for authentication, the commands they can access
are determined by the levels set on their user interfaces.
■
If the configured authentication method is none or password authentication,
the command level that a user can access after login is determined by the level
of the user interface.
■
If the clients connected to a port have different authorization VLANs, only the
first client passing the MAC address authentication can be assigned with an
authorization VLAN. The switch will not assign authorization VLANs for
subsequent users passing MAC address authentication. In this case, you are
recommended to connect only one MAC address authentication user or
multiple users with the same authorization VLAN to a port.
■
For local
RADIUS
authentication or
local
authentication to take effect, the
VLAN assignment mode must be set to
string
after you specify authorization
VLANs for local users.
Cutting Down User
Connections Forcibly
n
You can use the
display connection
command to view the connections of Telnet
users, but you cannot use the
cut connection
command to cut down their
connections.
RADIUS Configuration
Task List
3Com’s Ethernet switches can function not only as RADIUS clients but also as local
RADIUS servers.
Table 187
Cut down user connections forcibly
Operation
Command
Remarks
Enter system view
system-view
-
Cut down user connections
forcibly
cut connection
{
all
|
access-type
{
dot1x |
mac-authentication
} |
domain
isp-name
|
interface
interface-type
interface-number
|
ip
ip-address
|
mac
mac-address
|
radius-scheme
radius-scheme-name
|
vlan
vlan-id
|
ucibindex
ucib-index
|
user-name
user-name
}
Required
Summary of Contents for Switch 4210 9-Port
Page 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Page 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Page 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Page 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Page 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Page 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Page 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Page 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Page 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Page 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Page 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Page 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Page 340: ...338 CHAPTER 30 CLUSTER ...
Page 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Page 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Page 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Page 451: ......
Page 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Page 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Page 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...