270
Default
Strict checking mode on portal authentication information is disabled. If an authorized ACL or user
profile does not exist on the device or the ACL or user profile fails to be deployed, the user will not be
logged out.
Views
Interface view
Service template view
Predefined user roles
network-admin
Parameters
acl
: Enables strict checking on authorized ACLs.
user-profile
: Enables strict checking on authorized user profiles.
Usage guidelines
You can enable strict checking on authorized ACLs, authorized user profiles, or both. If you enable
both strict ACL checking and user profile checking, the user will be logged out if either checking fails.
An ACL/user profile checking fails when the authorized ACL/user profile does not exist on the device
or the ACL/user profile fails to be deployed.
Examples
# Enable strict checking on authorized ACLs on GigabitEthernet 1/0/1. (Wired application).
<Sysname> system-view
[Sysname] interface gigabitethernet 1/0/1
[Sysname–GigabitEthernet1/0/1] portal authorization acl strict-checking
# Enable strict checking on authorized ACLs on service template
service1
. (Wireless application.)
<Sysname> system-view
[Sysname] wlan service-template service1
[Sysname-wlan-st-service1] portal authorization acl strict-checking
Related commands
display portal
portal client-traffic-report interval
Use
portal client-traffic-report interval
to set the interval at which an AP reports traffic statistics to
the device.
Use
undo portal client-traffic-report interval
to restore the default.
Syntax
portal client-traffic-report interval
interval
undo portal client-traffic-report
interval
Default
An AP reports traffic statistics to the device at an interval of 60 seconds.
Views
System view