To do...
Display TCP spoofing statistics
Display information about portal
users on a specified interface or
all interfaces
Clear TCP spoofing statistics
Portal configuration examples
Configuring Layer 2 portal authentication
Network requirements
As shown in
authentication on users connected to port GigabitEthernet 1/0/1. More specifically,
Use the remote RADIUS server for authentication, authorization and accounting.
Use the remote DHCP server to assign IP addresses to users.
The listening IP address of the local portal server is 4.4.4.4. The local portal server pushes the user-
defined authentication pages to users and uses HTTPS to transmit authentication data.
Add users passing authentication to VLAN 3.
Add users failing authentication to VLAN 2, to allow the users to access resources on the update
server.
The host obtains an IP address through DHCP. Before authentication, the DHCP server assigns an IP
address in segment 192.168.1.0/24 to the host. When the host passes the authentication, the DHCP
server assigns an IP address in segment 3.3.3.0/24 to the host. When the host fails authentication,
the DHCP server assigns an IP address in segment 2.2.2.0/24 to the host.
Use the command...
display portal tcp-cheat statistics [ | {
begin | exclude | include } regular-
expression ]
display portal user { all | interface
interface-type interface-number } [ | {
begin | exclude | include } regular-
expression ]
reset portal tcp-cheat statistics
Figure
43, a host is directly connected to a switch. The switch performs Layer 2 portal
124
Remarks
Available in any view
Available in any view
Available in user view