691
•
TTLS-GTC.
If the MD5-Challenge EAP authentication is used, the configured 802.1X client anonymous identifier
does not take effect. The device uses the 802.1X client username at the first authentication phase.
Do not configure the 802.1X client anonymous identifier if the vendor-specific authentication server
cannot identify anonymous identifiers.
Examples
# Configure the 802.1X client anonymous identifier as
bbb
on a port.
<Sysname> system-view
[Sysname] interface ten-gigabitethernet 1/0/1
[Sysname-Ten-GigabitEthernet1/0/1] dot1x supplicant anonymous identify bbb
Related commands
display dot1x supplicant
dot1x supplicant enable
dot1x supplicant username
dot1x supplicant eap-method
Use
dot1x supplicant eap-method
to specify an 802.1X client EAP authentication method.
Use
undo dot1x supplicant eap-method
to restore the default.
Syntax
dot1x supplicant eap-method
{
md5
|
peap-gtc
|
peap-mschapv2
|
ttls-gtc
|
ttls-mschapv2
}
undo dot1x supplicant eap-method
Default
The MD5-Challenge authentication is used as the 802.1X client EAP authentication method.
Views
Ethernet interface view
Predefined user roles
network-admin
mdc-admin
Parameters
md5
: Specifies the MD5-challenge EAP authentication method.
peap-gtc
: Specifies the PEAP-GTC EAP authentication method.
peap-mschapv2
: Specifies the PEAP-MSCHAPv2 EAP authentication method
ttls-gtc
: Specifies the TTLS-GTC EAP authentication method.
ttls-mschapv2
: Specifies the TTLS-MSCHAPv2 EAP authentication method.
Usage guidelines
Make sure the specified 802.1X client EAP authentication method is supported by the authentication
server.
Examples
# Specify PEAP-GTC as the 802.1X client EAP authentication method on a port.
<Sysname> system-view
Содержание FlexNetwork 7500 Series
Страница 350: ...335 Related commands display port security port security enable ...
Страница 379: ...364 Sysname system view Sysname keychain abc mode absolute Sysname keychain abc tcp kind 252 ...
Страница 519: ...504 Related commands display ssh2 algorithm ssh2 algorithm cipher ssh2 algorithm key exchange ssh2 algorithm mac ...