221
Usage guidelines
Set the maximum number of concurrent MAC authentication users on a port to prevent the system
resources from being overused. When the maximum number is reached, the port denies subsequent
MAC authentication users.
Examples
# Configure Ten-GigabitEthernet 1/0/1 to support a maximum of 32 concurrent MAC authentication
users.
<Sysname> system-view
[Sysname] interface ten-gigabitethernet 1/0/1
[Sysname-Ten-GigabitEthernet1/0/1] mac-authentication max-user 32
Related commands
display mac-authentication
mac-authentication offline-detect enable
Use
mac-authentication offline-detect enable
to enable MAC authentication offline detection on a
port.
Use
undo mac-authentication
offline-detect enable
to disable MAC authentication offline
detection.
Syntax
mac-authentication offline-detect enable
undo mac-authentication
offline-detect enable
Default
MAC authentication offline detection is enabled on a port.
Views
Layer 2 Ethernet interface view
Layer 2 aggregate interface view
Predefined user roles
network-admin
mdc-admin
Usage guidelines
This command allows the device to log out a user if the device does not receive any packets from the
user within the offline detect timer. The device also requests to stop accounting for the user at the
same time. To set the offline detect timer, use the
mac-authentication timer
command.
The
undo mac-authentication offline-detect enable
command disables the device from
inspecting the online user status.
Examples
# Disable MAC authentication offline detection on Ten-GigabitEthernet 1/0/1.
<Sysname> system-view
[Sysname] interface ten-gigabitethernet 1/0/1
[Sysname-Ten-GigabitEthernet1/0/1] undo mac-authentication offline-detect enable
Related commands
mac-authentication timer
Содержание FlexNetwork 7500 Series
Страница 350: ...335 Related commands display port security port security enable ...
Страница 379: ...364 Sysname system view Sysname keychain abc mode absolute Sysname keychain abc tcp kind 252 ...
Страница 519: ...504 Related commands display ssh2 algorithm ssh2 algorithm cipher ssh2 algorithm key exchange ssh2 algorithm mac ...