Hardware
MSR 3610/3620/3620-DP/3640/3660
MSR5620/5660/5680
When the maximum number of portal authentication failure records is reached, the new record
overwrites the oldest one.
Examples
# Set the maximum number of portal authentication failure records to 50.
<Sysname> system-view
[Sysname] portal auth-fail-record max 50
Related commands
display portal auth-fail-record
portal authorization strict-checking
Use portal authorization strict-checking to enable strict checking on portal authorization
information.
Use undo portal authorization strict-checking to disable strict checking on portal authorization
information.
Syntax
portal authorization { acl | user-profile } strict-checking
undo portal authorization { acl | user-profile } strict-checking
Default
Strict checking mode on portal authentication information is disabled. If an authorized ACL or user
profile does not exist on the device or the ACL or user profile fails to be deployed, the user will not be
logged out.
Views
Interface view
Service template view
Predefined user roles
network-admin
Parameters
acl: Enables strict checking on authorized ACLs.
user-profile: Enables strict checking on authorized user profiles.
Usage guidelines
You can enable strict checking on authorized ACLs, authorized user profiles, or both. If you enable
both strict ACL checking and user profile checking, the user will be logged out if either checking fails.
An ACL/user profile checking fails when the authorized ACL/user profile does not exist on the device
or the ACL/user profile fails to be deployed.
Examples
# Enable strict checking on authorized ACLs on GigabitEthernet 1/0/1. (Wired application).
<Sysname> system-view
[Sysname] interface gigabitethernet 1/0/1
Command compatibility
Yes
Yes
328