Portal Authorization Strict-Checking - H3C MSR Series Command Reference Manual

Comware 7 security
Hide thumbs Also See for MSR Series:
Table of Contents

Advertisement

Hardware
MSR 3610/3620/3620-DP/3640/3660
MSR5620/5660/5680
When the maximum number of portal authentication failure records is reached, the new record
overwrites the oldest one.
Examples
# Set the maximum number of portal authentication failure records to 50.
<Sysname> system-view
[Sysname] portal auth-fail-record max 50
Related commands
display portal auth-fail-record

portal authorization strict-checking

Use portal authorization strict-checking to enable strict checking on portal authorization
information.
Use undo portal authorization strict-checking to disable strict checking on portal authorization
information.
Syntax
portal authorization { acl | user-profile } strict-checking
undo portal authorization { acl | user-profile } strict-checking
Default
Strict checking mode on portal authentication information is disabled. If an authorized ACL or user
profile does not exist on the device or the ACL or user profile fails to be deployed, the user will not be
logged out.
Views
Interface view
Service template view
Predefined user roles
network-admin
Parameters
acl: Enables strict checking on authorized ACLs.
user-profile: Enables strict checking on authorized user profiles.
Usage guidelines
You can enable strict checking on authorized ACLs, authorized user profiles, or both. If you enable
both strict ACL checking and user profile checking, the user will be logged out if either checking fails.
An ACL/user profile checking fails when the authorized ACL/user profile does not exist on the device
or the ACL/user profile fails to be deployed.
Examples
# Enable strict checking on authorized ACLs on GigabitEthernet 1/0/1. (Wired application).
<Sysname> system-view
[Sysname] interface gigabitethernet 1/0/1
Command compatibility
Yes
Yes
328

Advertisement

Table of Contents
loading

Table of Contents