Command Manual – 802.1x
Quidway S3900 Series Ethernet Switches-Release 1510
Chapter 1 802.1x Configuration Commands
Huawei Technologies Proprietary
1-12
System View: return to User View with Ctrl+Z.
[Quidway] dot1x port-control unauthorized-force interface Ethernet 1/0/1
1.1.8 dot1x port-method
Syntax
dot1x
port-method
{
macbased
|
portbased
} [
interface interface-list
]
undo dot1x
port-method
[
interface interface-list
]
View
System view, Ethernet port view
Parameter
macbased
: Authenticates supplicant systems by MAC addresses.
portbased
: Authenticates supplicant system by port numbers.
interface-list
: Ethernet port list. You can specify multiple Ethernet ports by providing this
argument in the form of
interface-list
= {
interface-name
[
to
interface-
name
] & < 1-10 >.
The
interface-name
argument is the port index of an Ethernet port and can be specified
in this form:
interface-name
= {
interface-type
interface-num
}, in which,
interface-type
specifies the type of a port and
interface-num
identifies the port number. Note that the
interface name
after the keyword
to
must have an
interface-num
that is greater than or
equal to that of the
interface-name
before the
to
keyword. &<1-10> means that up to 10
port indexes/port index lists can be provided.
The default access control method is MAC address-based. That is, the
macbased
keyword is specified by default.
Description
Use the
dot1x
port-method
command to specify the access control method for
specified Ethernet ports.
Use the
undo dot1x
port-method
command to revert to the default access control
method.
If you specify to authenticate supplicant systems by MAC addresses (that is, the
macbased
keyword is specified), all supplicant systems connected to the specified
Ethernet ports are authenticated separately. And if an online user logs off, others are
not affected.
If you specify to authenticate supplicant systems by port numbers (that is, the
portbased
keyword is specified), all supplicant systems connected to a specified
Ethernet port are able to access the network without being authenticated if a supplicant
system among them passes the authentication. And when the supplicant system logs
off, the network is inaccessible to all other supplicant systems either.