Dot1X Port-Method - 3Com 8807 Command Reference Manual

8800 series
Hide thumbs Also See for 8807:
Table of Contents

Advertisement

802.1x Configuration Commands
301
interface-list cannot be input when the command is executed in Ethernet port
view and it has effect only on the current interface.
Related command: display dot1x.
Example
# Configure the interface Ethernet 3/1/1 to be in unauthorized-force state.
[SW8800] dot1x port-control unauthorized-force interface ethernet 3/1/1

dot1x port-method

Syntax
dot1x port-method { macbased | portbased } [ interface interface-list ]
undo dot1x port-method [ interface interface-list ]
View
System view, Ethernet interface view
Parameter
macbased: Configures the 802.1x authentication system to perform
authentication on the supplicant based on MAC address.
portbased: Configures the 802.1x authentication system to perform
authentication on the supplicant based on interface number.
interface interface-list: Ethernet interface list expressed in the format interface-list
=interface-type interface-number [ to interface-type interface-number ] &<1-10>.
interface-type means the interface type, interface-number is the interface number.
Refer to command parameters in the "Port" section in the manual for the
respective meanings and value ranges of them. The interface number after the key
word to should be no smaller than the interface number before to. &<1-10> in
the command means that the preceding parameter can be entered up to 10 times.
Description
Use the dot1x port-method command to configure the base for 802.1x to
perform access control on the specified interface.
Use the undo dot1x port-method command to restore the default access
control base.
By default, the value is macbased.
This command is used to set the base for 802.1x to perform access control,
namely authenticate the users, on the specified interface. When macbased is
adopted, the user access this interface must be authenticated independently, and
if one successful authentication user is to finish network service, the other
accessed users can still use network service. When portbased is adopted, if only
the first access user by this interface can be authenticated successfully, the other
access users followed can be considered authenticated successfully automatically,
but if the first one finish the network service, the other accessed users' network
service will be rejected.

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

88148810

Table of Contents