270
C
HAPTER
22: MAC A
UTHENTICATION
C
ONFIGURATION
■
The service type of a local user needs to be configured as lan-access.
Related Concepts
MAC Authentication
Timers
The following timers function in the process of MAC authentication:
■
Offline detect timer: At this interval, the switch checks to see whether an
online user has gone offline. Once detecting that a user becomes offline, the
switch sends a stop-accounting notice to the RADIUS server.
■
Quiet timer: Whenever a user fails MAC authentication, the switch does not
initiate any MAC authentication of the user during a period defined by this
timer.
■
Server timeout timer: During authentication of a user, if the switch receives no
response from the RADIUS server in this period, it assumes that its connection
to the RADIUS server has timed out and forbids the user from accessing the
network.
Quiet MAC Address
When a user fails MAC authentication, the MAC address becomes a quiet MAC
address, which means that any packets from the MAC address will be discarded
simply by the switch until the quiet timer expires. This prevents an invalid user
from being authenticated repeatedly in a short time.
c
CAUTION:
If the quiet MAC is the same as the static MAC configured or an
authentication-passed MAC, then the quiet function is not effective.
Configuring Basic
MAC Authentication
Functions
Table 204
Configure basic MAC authentication functions
Operation
Command
Remarks
Enter system
view
system-view
-
Enable MAC
authentication
globally
mac-authentication
Required
Disabled by default
Enable MAC
authentication
for the specified
port(s) or the
current port
In system
view
mac-authentication interface
interface-list
Use either method
Disabled by default
In
interface
view
interface
interface-type
interface-number
mac-authentication
quit
Set the user
name in MAC
address mode
for MAC
authentication
mac-authentication authmode
usernameasmacaddress
[
usernameformat
{
with-hyphen
|
without-hyphen
} {
lowercase
|
uppercase
} |
fixedpassword
password
]
Optional
By default, the MAC
address of a user is used
as the user name.
Summary of Contents for Switch 4210 9-Port
Page 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Page 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Page 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Page 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Page 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Page 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Page 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Page 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Page 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Page 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Page 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Page 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Page 340: ...338 CHAPTER 30 CLUSTER ...
Page 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Page 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Page 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Page 451: ......
Page 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Page 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Page 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...