127
You cannot configure two or more portal-free rules with the same filtering criteria. Otherwise, the system
prompts that the rule already exists.
Regardless of whether portal authentication is enabled or not, you can only add or remove a portal-free
rule. You cannot modify it.
To configure an IP-based portal-free rule:
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Configure an
IPv4-based portal-free
rule.
portal free-rule
rule-number
{
destination
ip
{
ip-address
{
mask-length
|
mask
} |
any
} [
tcp
tcp-port-numbe
r |
udp
udp-port-number
] |
source
ip
{
ip-address
{
mask-length
|
mask
} |
any
} [
tcp
tcp-port-number
|
udp
udp-port-number
] } *
By default, no IPv4-based portal-free
rule exists.
3.
Configure an
IPv6-based portal-free
rule.
portal free-rule
rule-number
{
destination
ipv6
{
ipv6-address
prefix-length
|
any
} [
tcp
tcp-port-numbe
r |
udp
udp-port-number
] |
source
ipv6
{
ipv6-address prefix-length
|
any
} [
tcp
tcp-port-number
|
udp
udp-port-number
] } *
By default, no IPv6-based portal-free
rule exists.
To configure a source-based portal-free rule:
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Configure a
source-based
portal-free rule.
portal free-rule
rule-number
source
{
interface
interface-type
interface-number
|
mac
mac-address
|
vlan
vlan-id
} *
By default, no source-based
portal-free rule exists.
If you specify both a VLAN and an
interface, the interface must belong
to the VLAN. Otherwise, the
portal-free rule does not take effect.
Configuring an authentication source subnet
By configuring authentication source subnets, you specify that only HTTP packets from users on the
authentication source subnets can trigger portal authentication. If an unauthenticated user is not on any
authentication source subnet, the access device discards all the user's HTTP packets that do not match
any portal-free rule.