01-13 User Access and Authentication Commands
01-13 User Access and Authentication Commands
Switches
Command Reference 13 User Access and Authentication Commands
13.1.2 aaa
Function
The aaa command displays the AAA view.
Format
aaa
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
Using the aaa command in the system view, you can enter the AAA view and
perform the following security configurations for access users:
● Creating users
Example
# Access the AAA view.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa]
Format
aaa abnormal-offline-record
undo aaa abnormal-offline-record
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
If users abnormally log out, run aaa abnormal-offline-record command to
enable the record function for fault locating.
After the undo aaa abnormal-offline-record command is run, no abnormal
logout information is recorded unless the aaa abnormal-offline-record command
is run.
Example
# Enable the device to record users' abnormal logout information.
<HUAWEI> system-view
[HUAWEI] aaa abnormal-offline-record
Format
aaa offline-record
undo aaa offline-record
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
If users fail to get online, run aaa offline-record command to enable the record
function for fault locating.
After the undo aaa offline-record command is run, no logout information is
recorded unless the aaa offline-record command is run.
Example
# Enable the device to record users' normal logout information.
<HUAWEI> system-view
[HUAWEI] aaa offline-record
Function
The aaa online-fail-record command enables the device to record users' online
failures.
The undo aaa online-fail-record command disables the device from recording
users' online failures.
Format
aaa online-fail-record
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
If you want to query the login failure records to find out unauthorized users, run
the aaa online-fail-record command to enable the device to record users' online
failures.
Example
# Enable the device to record users' online failures.
<HUAWEI> system-view
[HUAWEI] aaa online-fail-record
13.1.6 aaa-authen-bypass
Function
The aaa-authen-bypass command sets the bypass authentication timeout
interval.
The undo aaa-authen-bypass command cancels the bypass authentication
timeout interval.
By default, no bypass authentication timeout interval is set.
Format
aaa-authen-bypass enable time time-value
undo aaa-authen-bypass enable
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
This command applies to the scenarios that require fast authentication response.
When a user in a user domain where multiple authentication modes (for example,
RADIUS authentication and local authentication) are configured, bypass
authentication is enabled, and the bypass authentication timeout interval is
configured, the user will be authenticated using the local authentication mode
and the bypass authentication timer is enabled simultaneously if the RADIUS
server does not respond to the authentication request. When other users in the
same domain are authenticated during the configured bypass authentication
timeout interval, the users are directly authenticated using the local
authentication mode, so that the users can be authenticated without waiting until
the RADIUS server responds to their authentication requests, accelerating the
authentication response.
Precautions
When only one authentication mode is configured in a user domain and the
bypass authentication timer is enabled, other users in the same domain are
directly considered to fail the authentication during the bypass authentication
timeout interval.
Example
# Set the bypass authentication timeout interval to 3 minutes.
<HUAWEI> system-view
[HUAWEI] aaa-authen-bypass enable time 3
Related Topics
13.1.7 aaa-author-bypass
13.1.8 aaa-author-cmd-bypass
13.1.7 aaa-author-bypass
Function
The aaa-author-bypass command sets the bypass authorization timeout interval.
The undo aaa-author-bypass command cancels the bypass authorization timeout
interval.
By default, no bypass authorization timeout interval is set.
Format
aaa-author-bypass enable time time-value
undo aaa-author-bypass enable
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
This command applies to the scenarios that require fast authorization response.
When a user in a user domain where multiple authorization modes (for example,
HWTACACS authorization and local authorization) are configured, bypass
authorization is enabled, and the bypass authorization timeout interval is
configured, the user will be authorized using the local authorization mode and the
bypass authorization timer is enabled simultaneously if the HWTACACS server
does not respond to the authorization request. When other users in the same
domain are authorized during the configured bypass authorization timeout
interval, the users are directly authorized using the local authorization mode, so
that the users can be authorized without waiting until the HWTACACS server
responds to their authorization requests, accelerating the authorization response.
Precautions
When only one authorization mode is configured in a user domain and the bypass
authorization timer is enabled, other users in the same domain are directly
considered to fail the authorization during the bypass authorization timeout
interval.
Example
# Set the bypass authorization timeout interval to 3 minutes.
<HUAWEI> system-view
[HUAWEI] aaa-author-bypass enable time 3
Related Topics
13.1.6 aaa-authen-bypass
13.1.8 aaa-author-cmd-bypass
13.1.8 aaa-author-cmd-bypass
Function
The aaa-author-cmd-bypass command sets the command-line bypass
authorization timeout interval.
Format
aaa-author-cmd-bypass enable time time-value
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Precautions
Example
# Set the command-line bypass authorization timeout interval to 3 minutes.
<HUAWEI> system-view
[HUAWEI] aaa-author-cmd-bypass enable time 3
Related Topics
13.1.6 aaa-authen-bypass
13.1.7 aaa-author-bypass
Function
The aaa-author session-timeout invalid-value enable command prevents a
device from disconnecting or reauthenticating users when the RADIUS server
delivers session-timeout with value 0.
By default, when the RADIUS server delivers session-timeout with value 0, this
attribute does not take effect.
Format
aaa-author session-timeout invalid-value enable
Parameters
None
Views
AAA view
Default Level
3: Management level
Usage Guidelines
When the RADIUS server delivers session-timeout with value 0:
Example
# Prevent the device from disconnecting or reauthenticating users when the
RADIUS server delivers session-timeout with value 0.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] aaa-author session-timeout invalid-value enable
Function
The accounting interim-fail command sets the maximum number of real-time
accounting failures and configures a policy used after the number of real-time
accounting failures exceeds the maximum.
Format
accounting interim-fail [ max-times times ] { offline | online }
Parameters
Parameter Description Value
Views
Accounting scheme view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
After the real-time accounting function takes effect, the device sends real-time
accounting requests to an accounting server, and the accounting server responds
to the accounting requests. If the network is unstable, for example, a jitter occurs,
the device may not receive response packets. As a result, accounting is interrupted
for a short period of time. To reduce or prevent accounting interruption, run the
accounting interim-fail command to set the maximum number of real-time
accounting failures. The device considers that real-time accounting fails only after
the number of consecutive real-time accounting failures exceeds the maximum.
Choose one of the following policies to be applied after the maximum number of
real-time accounting failures is reached:
● online: To prevent users from being affected by network faults, use the
online policy to allow paid users to go online.
● offline: To stop providing services when accounting fails, use the offline
policy to force paid users to go offline.
Prerequisites
The real-time accounting function has been enabled by using the accounting
realtime command.
Precautions
The accounting interim-fail command does not take effect for online users, but
takes effect for the users who go online after the command is executed.
Example
# In the accounting scheme scheme1, set the maximum number of real-time
accounting failures to 5 and use the offline policy.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] accounting-scheme scheme1
[HUAWEI-aaa-accounting-scheme1] accounting realtime 3
[HUAWEI-aaa-accounting-scheme1] accounting interim-fail max-times 5 offline
Related Topics
13.1.11 accounting realtime
Format
accounting realtime interval
undo accounting realtime
Parameters
Parameter Description Value
Views
Accounting scheme view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
This command applies to the users who are charged based on online duration. If a
user goes offline unexpectedly, the accounting server cannot receive the
accounting-stop packet, so it keeps charging the user while they are not receiving
a service. To solve the problem, configure the real-time accounting function on the
device. After the real-time accounting function is configured, the device
periodically sends real-time accounting packets to the accounting server. After
receiving the real-time accounting packets, the accounting server charges the user.
If the device detects that the user goes offline, it stops sending real-time
accounting packets and the accounting server stops accounting. The result of real-
time accounting is precise.
Precautions
● When the accounting interval is set using both the accounting realtime
command and the Acct-Interim-Interval attribute, if the Acct-Interim-Interval
value range is 60-3932100, the interval set by Acct-Interim-Interval has a
higher priority. Otherwise, the interval set by the accounting realtime
command takes effect.
● If an accounting scheme is applied to a domain, the accounting realtime
command does not affect online users, but only takes effect for the users who
go online after the command is executed.
● If interval is set to 0 and the IP address of the client is changed, the device
still sends a real-time accounting packet carrying the changed IP address
information to the RADIUS server.
● A short interval for real-time accounting requires high performance of the
device and accounting server. If there are more than 1000 users, setting a
long interval for real-time accounting is recommended. The following table
lists the suggested real-time accounting intervals for different user quantities.
1-99 3
100-499 6
500-999 12
≥ 1000 ≥ 15
Example
# In the accounting scheme scheme1, enable the real-time accounting function
and set the interval for real-time accounting to 6 minutes.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] accounting-scheme scheme1
[HUAWEI-aaa-accounting-scheme1] accounting realtime 6
Related Topics
13.1.10 accounting interim-fail
By default, users cannot go online if accounting-start fails. That is, the offline
policy is used.
Format
accounting start-fail { offline | online }
undo accounting start-fail
Parameters
Parameter Description Value
Views
Accounting scheme view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
If a user goes online after an accounting scheme is applied, the device sends an
accounting-start packet to an accounting server. When the network is working
properly, the accounting server responds to the accounting-start packet. If a fault
occurs on the network, the device may not receive the response packet from the
accounting server. As a result, accounting fails. The device provides the following
policies for accounting failures:
● online: To prevent users from being affected by network faults, use the
online policy to allow paid users to go online.
● offline: To stop providing services when accounting fails, use the offline
policy to force paid users to go offline.
Precautions
The command takes effect only when the accounting mode configured using the
13.1.13 accounting-mode command is HWTACACS or RADIUS.
Example
# In the accounting scheme scheme1, use the online policy for accounting-start
failures.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] accounting-scheme scheme1
[HUAWEI-aaa-accounting-scheme1] accounting start-fail online
13.1.13 accounting-mode
Function
The accounting-mode command configures an accounting mode in an
accounting scheme.
Format
accounting-mode { hwtacacs | none | radius }
undo accounting-mode
Parameters
Parameter Description Value
Views
Accounting scheme view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
When a user goes online, accounting starts after the user is authenticated and
authorized. When the user goes offline, accounting stops. The client sends the
account packet containing the user's online duration to the accounting server.
To charge users, set the accounting mode to RADIUS or HWTACACS. Generally, the
accounting mode is consistent with the authentication mode. If you do not need
to charge users, set the accounting mode to none.
Precautions
The device does not support local accounting. When the authentication scheme
configured using the 13.1.18 authentication-mode (authentication scheme
view) command defines local authentication, you need to run the accounting-
mode none command to configure non-accounting or run the 13.1.12
accounting start-fail command to configure a policy for accounting-start failures.
Follow-up Procedure
Apply the accounting scheme to a domain to enable the device to charge the
users in the domain using the 13.1.47 domain (AAA view) command.
Example
# Set the accounting mode to RADIUS in the accounting scheme scheme1.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] accounting-scheme scheme1
[HUAWEI-aaa-accounting-scheme1] accounting-mode radius
Format
accounting-scheme accounting-scheme-name
undo accounting-scheme
Parameters
Parameter Description Value
Views
AAA domain view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To charge users in a domain, create an accounting scheme and perform
configurations in the accounting scheme, for example, set the accounting mode
and policy for accounting-start failures. Run the accounting-scheme command in
the AAA domain view to apply the accounting scheme to the domain.
Prerequisites
An accounting scheme has been created and configured using the 13.1.15
accounting-scheme (AAA view) command. For example, the accounting mode
and policy for accounting-start failures have been configured.
Example
# Apply the accounting scheme account1 to the domain isp1.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] accounting-scheme account1
[HUAWEI-aaa-accounting-account1] quit
[HUAWEI-aaa] domain isp1
[HUAWEI-aaa-domain-isp1] accounting-scheme account1
Related Topics
13.1.15 accounting-scheme (AAA view)
13.1.35 display accounting-scheme
Format
accounting-scheme accounting-scheme-name
undo accounting-scheme accounting-scheme-name
Parameters
Parameter Description Value
Views
AAA view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To charge users in a domain, create and configure an accounting scheme, for
example, the accounting mode and policy for accounting-start failures. Run the
accounting-scheme command in the AAA domain view to apply the accounting
scheme to the domain.
Follow-up Procedure
After an accounting scheme is created:
● Run the accounting interim-fail command to set the maximum number of
real-time accounting failures and configure a policy used after a real-time
accounting failure.
● Run the accounting realtime command to enable the real-time accounting
function and set the interval for real-time accounting in an accounting
scheme.
● Run the accounting start-fail command to configure a policy for accounting-
start failures.
● Run the accounting-mode command to configure an accounting mode in an
accounting scheme.
After an accounting scheme is configured, run the 13.1.14 accounting-scheme
(AAA domain view) command in the AAA domain view to apply the accounting
scheme to a domain.
Precautions
If the configured accounting scheme does not exist, the accounting-scheme
command in the AAA view creates an accounting scheme and displays the
accounting scheme view. If the configured accounting scheme already exists, the
accounting-scheme command in the AAA view displays the accounting scheme
view directly.
To delete an accounting scheme applied to a domain, run the undo accounting-
scheme (AAA domain view) command.
Example
# Create an accounting scheme named scheme1.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] accounting-scheme scheme1
[HUAWEI-aaa-accounting-scheme1]
Related Topics
13.1.14 accounting-scheme (AAA domain view)
Function
The admin-user privilege level command configures a user as an administrator
to log in to the device and sets the user level.
The undo admin-user privilege level command cancels the default user level.
By default, the user level is not configured.
Format
admin-user privilege level level
undo admin-user privilege level
Parameters
Parameter Description Value
Views
Service scheme view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The device provides hierarchical management of commands. A command has a
level, and a user can run only the commands of the same level or lower levels. By
using the admin-user privilege level command to set the user level, the device
controls commands used by users.
By default, commands are classified into the following levels:
● Level 0 (visit level): Commands at level 0 include diagnosis commands such as
ping and tracert commands and commands that are used to access a remote
device such as the Telnet client. Commands at level 0 cannot be used to save
configuration files.
● Level 1 (monitoring level): Commands at level 1 are used for system
maintenance, including display commands. Commands at level 1 cannot be
used to save configuration files.
● Level 2 (configuration level): Commands at level 2 are used for service
configuration, including routing commands and commands at each network
layer to provide network services for users.
● Level 3 (management level): Commands at level 3 are used for basic
operations of the system to support services, including file system, FTP, Trivial
File Transfer Protocol (TFTP), configuration file switching commands, slave
board control commands, user management commands, command level
configuration commands, and debugging commands.
To manage users refinedly, upgrade command levels to levels 0 to 15. You can run
the command-privilege level command to upgrade command levels in a batch.
You can also run the command-privilege level rearrange command to upgrade
levels.
The local user level is used only when the remote authentication server is faulty.
If the remote authentication server responds to authentication requests but does
not deliver user levels, the configured local user level does not take effect.
The device can update the configuration in a domain dynamically. After a service
scheme is applied to a domain, you can directly modify the user level in the
service scheme but cannot unbind the service scheme from the domain. To delete
the service scheme, run the undo service-scheme (AAA domain view) command.
Follow-up Procedure
Run the display service-scheme command to view the user level in a service
scheme.
Example
# Configure a user as an administrator to log in to the device and set the
administrator level to 15.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] service-scheme svcscheme1
[HUAWEI-aaa-service-svcscheme1] admin-user privilege level 15
Related Topics
13.1.45 display service-scheme
13.1.54 local-user
13.1.82 service-scheme (AAA view)
2.5.27 user privilege
Function
The authentication ipv6-statistics enable command enables IPv6 traffic statistics
collection.
NOTE
Format
authentication ipv6-statistics enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the statistic enable (AAA domain view) command is run to collect user
traffic statistics, the switch does not collect statistics on IPv6 traffic by default. To
enable IPv6 traffic statistics collection, run the authentication ipv6-statistics
enable command.
Precautions
● The switch does not support IPv6 traffic statistics collection for Layer 2 Portal
authentication users and user terminals with one MAC address and multiple
IP addresses.
● The switch does not support IPv6 traffic statistics collection for Layer 3 Portal
authentication users.
Example
# Enable IPv6 traffic statistics collection.
<HUAWEI> system-view
[HUAWEI] authentication ipv6-statistics enable
Function
The authentication-mode command configures an authentication mode for an
authentication scheme.
The undo authentication-mode command restores the default authentication
mode in an authentication scheme.
By default, local authentication is used.
Format
authentication-mode { hwtacacs | local | radius } * [ none ]
authentication-mode none
undo authentication-mode
Parameters
Parameter Description Value
hwtacacs Authenticates users using an HWTACACS server. To perform -
HWTACACS authentication, configure an HWTACACS
authentication server in an HWTACACS server template.
local Authenticates users locally. -
radius Authenticates users using a RADIUS server. To perform -
RADIUS authentication, configure a RADIUS authentication
server in a RADIUS server template.
none Indicates non-authentication. That is, users access the -
network without being authenticated.
Views
Authentication scheme view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Normally, if the remote server is Down or does not respond, local authentication is
used. If a large number of users need to go online through the device, the device may
be unable to process responses from the server in a timely manner. As a result, the
AAA module of the device cannot receive responses from the server until the
protection timer expires. These users then cannot go online and cannot be
authenticated using local authentication. In this case, reconnect these offline users to
the device.
NOTE
● When both RADIUS authentication and non-authentication are configured, if the user
fails the RADIUS authentication, non-authentication cannot be used. As a result, a user
fails to log in.
● If you run the authentication-mode command to configure non-authentication and run
the authentication-mode (user interface view) command to configure AAA
authentication, the device does not allow administrators to log in from the user
interface view.
Precautions
If non-authentication is configured using the authentication-mode command,
users can pass the authentication using any user name or password. Therefore, to
protect the device and improve network security, you are advised to enable
authentication, allowing only authenticated users to access the device or network.
Example
# Configure the authentication scheme named scheme1 to use RADIUS
authentication.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] authentication-scheme scheme1
[HUAWEI-aaa-authen-scheme1] authentication-mode radius
Function
The authentication-scheme command applies an authentication scheme to a
domain.
The undo authentication-scheme command restores the default configuration of
the authentication scheme in a domain.
By default, the authentication scheme named radius is applied to the default
domain, the authentication scheme named default is applied to the
default_admin domain, and the authentication scheme named radius is applied
to other domains.
Format
authentication-scheme scheme-name
undo authentication-scheme
Parameters
Parameter Description Value
scheme-name Specifies the name of an The value must be an existing
authentication scheme. authentication scheme name.
Views
AAA domain view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To authenticate users in a domain, run the authentication-scheme (AAA domain
view) command to apply an authentication scheme to a domain.
Prerequisites
An authentication scheme has been created and configured with required
parameters, for example, the authentication mode and authentication mode for
upgrading user levels.
Example
# Apply the authentication scheme named scheme1 to a domain named
domain1.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] domain domain1
[HUAWEI-aaa-domain-domain1] authentication-scheme scheme1
Related Topics
13.1.20 authentication-scheme (AAA view)
13.1.37 display authentication-scheme
Function
The authentication-scheme command creates an authentication scheme and
displays its view.
The undo authentication-scheme command deletes an authentication scheme.
By default, the default authentication scheme is used. This default authentication
scheme can be modified but cannot be deleted. In the default authentication
scheme:
● Local authentication is used.
● The offline policy is used for authentication failures.
By default, the system also provides the authentication scheme radius. The radius
authentication scheme can be modified, but cannot be deleted. In the radius
authentication scheme:
● RADIUS authentication is used.
● The offline policy is used for authentication failures.
Format
authentication-scheme scheme-name
undo authentication-scheme scheme-name
Parameters
Parameter Description Value
scheme-name Specifies the name of The value is a string of 1 to 32 case-
an authentication sensitive characters. It cannot contain
scheme. spaces or the following symbols: / \ : * ? "
< > | @ ' %. The value cannot be - or --.
Views
AAA view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To authenticate users, run the authentication-scheme command to create an
authentication scheme. Creating an authentication scheme is necessary before
performing authentication-relevant configurations.
Follow-up Procedure
After an authentication scheme is created, run the authentication-mode
(authentication scheme view) command to configure an authentication mode in
an authentication scheme.
After an authentication scheme is configured, run the authentication-scheme
(AAA domain view) command to apply the authentication scheme to a domain.
Precautions
If the configured authentication scheme does not exist, the authentication-
scheme command creates an authentication scheme and displays the
authentication scheme view. If the configured authentication scheme already
exists, the authentication-scheme command directly displays the authentication
scheme view.
To delete an authentication scheme applied to a domain, run the undo
authentication-scheme (AAA domain view) command.
Example
# Create an authentication scheme named newscheme.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] authentication-scheme newscheme
[HUAWEI-aaa-authen-newscheme]
Related Topics
13.1.19 authentication-scheme (AAA domain view)
13.1.37 display authentication-scheme
13.1.21 authentication-super
Function
The authentication-super command configures an authentication mode for
upgrading user levels in an authentication scheme.
The undo authentication-super command restores the default authentication
mode for upgrading user levels in an authentication scheme.
By default, the super mode is used. That is, local authentication is used.
Format
authentication-super { hwtacacs | radius | super } * [ none ]
authentication-super none
undo authentication-super
Parameters
Parameter Description Value
Views
Authentication scheme view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
If users in a domain need to upgrade their levels, the device requests the users to
enter the password to authenticate the users. If AAA authentication has been
configured using the authentication-mode (user interface view) command, run
the authentication-super command to configure an authentication mode for
upgrading user levels.
When you use the super command to switch a user level to a lower level or the
same level, no authentication is required. When you use the super command to
switch a user level to a higher level, authentication is required. The user can be
granted rights only after being authenticated.
● If super is used and the local authentication is specified, run the local-user
command in the AAA view to create a local user and set parameters for the
local user.
● If hwtacacs is used and the HWTACACS authentication is specified, perform
configurations relevant to HWTACACS authentication.
● If radius is used and the RADIUS authentication is specified, perform
configurations relevant to RADIUS authentication.
● If none is used, no authentication is required.
Precautions
If multiple authentication modes are configured in an authentication scheme,
these authentication modes are used in the sequence in which they were
configured. The device uses another authentication mode only when it does not
receive any response in the current authentication. The device does not switch to
another authentication mode if the user fails to pass one authentication mode.
Example
# Set the authentication mode to HWTACACS authentication in the authentication
scheme scheme1.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] authentication-scheme scheme1
[HUAWEI-aaa-authen-scheme1] authentication-super hwtacacs
Related Topics
2.5.3 authentication-mode (user interface view)
13.1.19 authentication-scheme (AAA domain view)
13.1.20 authentication-scheme (AAA view)
13.1.37 display authentication-scheme
Format
authentication-type radius chap access-type admin [ ftp | ssh | telnet |
terminal | http ] *
undo authentication-type radius chap access-type admin
Parameters
Parameter Description Value
Views
Authentication scheme view
Default Level
3: Management level
Usage Guidelines
CHAP is ciphertext authentication protocol. During CHAP authentication, the NAS
device sends the user name, encrypted password, and 16-byte random code to the
RADIUS server. The RADIUS server searches for the database according to the user
name and obtains the password that is the same as the encrypted password at the
user side. The RADIUS server then encrypts the received 16-byte random code and
compares the result with the password. If they are the same, the user is
authenticated. If they are different, the user fails to be authenticated. In addition,
if the user is authenticated, the RADIUS server generates a 16-byte random code
to challenge the user. CHAP is more secure and reliable than PAP.
When the device is connected to the RADIUS server that supports CHAP
authentication, this function needs to be configured.
Example
# Replace PAP authentication with CHAP authentication when RADIUS
authentication is performed on administrators who access the device using FTP.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] authentication-scheme scheme1
[HUAWEI-aaa-authen-scheme1] authentication-type radius chap access-type admin ftp
Related Topics
13.1.37 display authentication-scheme
13.1.23 authorization-cmd
Function
The authorization-cmd command configures command-specific authorization for
an administrator of a specific level. After command-specific authorization is
enabled and an administrator of a specific level logs in to the device, the
commands that the administrator enters can be executed only after being
authorized by the HWTACACS server.
Format
authorization-cmd privilege-level hwtacacs [ local ] [ none ]
Parameters
Parameter Description Value
privilege-level Specified the administrator level. The value is an
integer that ranges
from 0 to 15.
hwtacacs Indicates HWTACACS authorization. -
local Indicates local authorization. -
Views
Authorization scheme view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
After being authorized, the users at a certain level can run the commands of the
same or lower levels. Command line authorization can be configured to
implement minimum user rights control. When command line authorization is
enabled, each command entered by users can be executed only after being
authorized. After command line authorization is enabled for users at a certain
level, the commands run by the users at that level must be authorized by an
HWTACACS server.
Precautions
You are advised to configure local authorization as a backup of command line
authorization. If command line authorization cannot be performed because of a
failure on an HWTACACS server, the device starts local authorization.
After the authorization-cmd command is executed, command line authorization
does not take effect immediately. Command line authorization takes effect only
when an authorization scheme containing command line authorization is applied
to administrator view correctly.
NOTICE
Example
# Configure command line authorization administrators at level 2.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] authorization-scheme scheme1
[HUAWEI-aaa-author-scheme1] authorization-cmd 2 hwtacacs
Format
authorization-info check-fail policy { online | offline }
undo authorization-info check-fail policy
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The device supports user authorization through the ACL, UCL Group, User Group
and VLAN delivered from the RADIUS server. If the ACL, UCL Group, User Group
and VLAN delivered from the RADIUS server are not configured on the device, the
authorization information check fails on the device.
You can use this command to configure the users to go online and the
authorization information delivered by the RADIUS server does not take effect.
Example
# Configure the device to allow users to go online after the authorization
information check fails.
<HUAWEI> system-view
[HUAWEI] authorization-info check-fail policy online
13.1.25 authorization-mode
Function
The authorization-mode command configures an authorization mode for an
authorization scheme.
Format
authorization-mode { hwtacacs | if-authenticated | local } * [ none ]
authorization-mode none
undo authorization-mode
Parameters
Parameter Description Value
Views
Authorization scheme view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To authorize users, configure an authorization mode in an authorization scheme.
You can configure multiple authorization modes in an authorization scheme to
reduce the chance of authorization failures.
After the authorization-mode hwtacacs local command is used, if it fails to
connect to the HWTACACS authentication server and HWTACACS authorization
cannot be performed, the device starts local authorization.
Precautions
● If multiple authorization modes are used in an authorization scheme, the if-
authenticated mode or none mode must be used as the last authorization
mode.
● When the authorization mode is if-authenticated or none, the user privilege
level is inherited from the user domain or is the same as that set in the VTY
user view.
● If multiple authorization modes are configured in an authorization scheme,
the authorization modes are used according to the sequence in which they
were configured. The device uses another authorization mode only when it
does not receive any response in the current authorization.
Example
# Configure the authorization scheme named scheme1 to apply HWTACACS
authorization.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] authorization-scheme scheme1
[HUAWEI-aaa-author-scheme1] authorization-mode hwtacacs
Format
authorization-modify mode { modify | overlay }
Parameters
Parameter Description Value
Views
AAA view
Default Level
3: Management level
Usage Guidelines
The authorization server can deliver all or part of user authorization information,
such as the ACL rule and dynamic VLAN.
You can run the authorization-modify mode command to configure one of the
following update modes for user authorization information delivered by the
authorization server:
● modify: modification mode indicating that new user authorization
information overwrites only existing user authorization information of the
same type.
● overlay: overwriting mode indicating that new user authorization information
overwrites all existing user authorization information.
If the authorization server has delivered ACL 3001 to a user, and the administrator
needs to deliver new authorization information:
● In the modify mode, if the new authorization information is ACL 3002, the
authorization information of the user is ACL 3002. If the new authorization
information is VLAN 100, the authorization information of the user is ACL
3001 and VLAN 100.
● In the overlay mode, no matter whether the new authorization information is
ACL 3002 or VLAN 100, the authorization information of the user is the new
ACL or VLAN.
This command takes effect for only the authorization information delivered by the
RADIUS server.
After a user group or service scheme is authorized to a user on the device and a
certain attribute configured in the user group or service scheme is modified on the
server, if other configured attributes need to be modified, the authorization
information on the server must contain the previously modified attribute.
Otherwise, the original attribute value in the user group or service scheme will be
restored. For example, to modify an attribute in a user group:
1. The device authorizes the user group configured with the VLAN and ACL
attributes to a user.
2. To modify the VLAN attribute, authorize the new VLAN attribute to the user
through the RADIUS server.
3. To modify the ACL attribute after the VLAN attribute is modified, you must
authorize the modified VLAN attribute and new ACL attribute through the
RADIUS server. Otherwise, the original VLAN attribute in the user group will
be restored.
Example
# Set the update mode of user authorization information delivered by the
authorization server to modify.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] authorization-modify mode modify
Function
The authorization-scheme command applies an authorization scheme to a
domain.
Format
authorization-scheme authorization-scheme-name
undo authorization-scheme
Parameters
Parameter Description Value
Views
AAA domain view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
RADIUS integrates authentication and authorization; therefore, RADIUS
authorization and authentication must be used together. HWTACACS separates
authentication from authorization; therefore, you can configure another
authorization type even if HWTACACS authentication, local authentication, or
non-authentication is used.
To authorize users in a domain, run the authorization-scheme (AAA domain
view) command.
Prerequisites
An authorization scheme has been created and configured with required
parameters, for example, the authorization mode and command line
authorization.
Example
# Apply the authorization scheme author1 to the domain isp1.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] authorization-scheme author1
[HUAWEI-aaa-author-author1] quit
[HUAWEI-aaa] domain isp1
[HUAWEI-aaa-domain-isp1] authorization-scheme author1
Related Topics
13.1.28 authorization-scheme (AAA view)
13.1.38 display authorization-scheme
Format
authorization-scheme authorization-scheme-name
undo authorization-scheme authorization-scheme-name
Parameters
Parameter Description Value
Views
AAA view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
RADIUS integrates authentication and authorization; therefore, RADIUS
authorization and authentication must be used together. HWTACACS separates
authentication from authorization; therefore, you can configure another
authorization type even if HWTACACS authentication, local authentication, or
non-authentication is used. You must run the authorization-scheme command to
create an authorization scheme before performing authorization-relevant
configurations, for example, setting the authorization mode and command line
authorization function.
Follow-up Procedure
After an authorization scheme is created:
● Run the authorization-mode command to configure an authorization mode
in an authorization scheme.
● Run the authorization-cmd command to configure command line
authorization for users at a certain level.
After an authorization scheme is configured, run the authorization-scheme (AAA
domain view) command to apply the authorization scheme to a domain.
Precautions
● If the configured authorization scheme does not exist, the authorization-
scheme (AAA view) command creates an authorization scheme and displays
the authorization scheme view.
● If the configured authorization scheme already exists, the authorization-
scheme (AAA view) command directly displays the authorization scheme
view.
Example
# Create an authorization scheme named scheme0.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] authorization-scheme scheme0
[HUAWEI-aaa-author-scheme0]
Related Topics
13.1.27 authorization-scheme (AAA domain view)
Format
cmd recording-scheme recording-scheme-name
undo cmd recording-scheme
Parameters
Parameter Description Value
Views
AAA view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
During the device configuration, incorrect operations may result in network faults.
After the cmd recording-scheme command is executed, you can view records of
the commands executed on the device to locate the network faults.
Prerequisites
Example
# Configure a policy in the recording scheme scheme0 to record the commands
executed on the device.
<HUAWEI> system-view
[HUAWEI] hwtacacs-server template hw1
[HUAWEI-hwtacacs-hw1] quit
[HUAWEI] aaa
[HUAWEI-aaa] recording-scheme scheme0
[HUAWEI-aaa-recording-scheme0] recording-mode hwtacacs hw1
[HUAWEI-aaa-recording-scheme0] quit
[HUAWEI-aaa] cmd recording-scheme scheme0
Related Topics
13.1.43 display recording-scheme
13.1.70 recording-mode hwtacacs
13.1.71 recording-scheme
Function
The cut access-user command terminates one or multiple access user
connections, also forcibly disconnecting online users.
Format
cut access-user { domain domain-name | interface interface-type interface-
number [ vlan vlan-id [ qinq qinq-vlan-id ] ] | ip-address ip-address [ vpn-
instance vpn-instance-name ] | mac-address mac-address | service-scheme
service-scheme-name | access-slot slot-id | user-id begin-number [ end-number ]
| username user-name }
cut access-user ssid ssid-name (This command is only supported by the S5720HI.)
cut access-user access-type { admin [ ftp | ssh | telnet | terminal | web ] | ppp }
[ username user-name ]
NOTE
Parameters
Parameter Description Value
Views
AAA view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Precautions
The cut access-user command interrupts all services of the user whose session is
torn down.
If the character string of the user name contains spaces (for example, a b), you
can run the display access-user username "a b" command to view online users.
If the character string of the user name contains spaces and quotation marks ("")
simultaneously, you cannot use the user name to view online users. In this case,
you can run the display access-user | include username command to view the
user ID of the online user, and then run the display access-user user-id user-id
command to view the user. Alternatively, you can run the cut access-user user-id
user-id command to force the user to go offline.
Example
# Tear down the session initiated by the IP address 10.1.1.1.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] cut access-user ip-address 10.1.1.1
Related Topics
13.1.34 display access-user (All views)
Function
The display aaa command displays information about normal logout, abnormal
logout, and login failures.
Format
display aaa { offline-record | abnormal-offline-record | online-fail-record } { all
| reverse-order | domain domain-name | interface interface-type interface-
number [ vlan vlan-id [ qinq qinq-vlan-id ] ] | ip-address ip-address [ vpn-
instance vpn-instance-name ] | mac-address mac-address | access-slot slot-
number | time start-time end-time [ date start-date end-date ] | username user-
name [ time start-time end-time [ date start-date end-date ] ] } [ brief ]
NOTE
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
This command allows you to view information about user normal logouts,
abnormal logouts, and login failures based on the domain name, interface, IP
address, VPN instance, MAC address, or slot ID.
Precautions
Only letters, digits, and special characters can be displayed for username.
When the value of username contains special characters or characters in other
languages except English, the device displays dots (.) for these characters. If there
are more than three such consecutive characters, three dots (.) are displayed.
Here, the special characters are the ASCII codes smaller than 32 (space) or larger
than 126 (~).
When the value of username is longer than 20 characters, the device displays up
to three dots (.) for the characters following 19; that is, only 22 characters are
displayed.
Example
# View information about user normal logouts in domain rds.
<HUAWEI> display aaa offline-record domain rds
-------------------------------------------------------------------
User name : test@rds
Domain name : rds
Item Description
Item Description
Item Description
Format
display aaa configuration
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
AAA configurations are limited by system specifications. Before performing AAA
configurations, run the display aaa configuration command to check whether
there are sufficient resources.
Example
# Display the AAA summary.
<HUAWEI> display aaa configuration
Domain Name Delimiter Domain name delimiter, which can be any of the
following characters: \ / : < > | @ ' %. The default
domain name delimiter is @.
To configure a domain name delimiter, run the
13.1.50 domain-name-delimiter command.
Item Description
Item Description
Related Topics
13.1.2 aaa
13.1.47 domain (AAA view)
Format
display aaa statistics offline-reason
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The display aaa statistics offline-reason command helps you know the reason
why a user goes offline. You can locate network faults according to the command
output.
Example
# Display reasons why users go offline.
<HUAWEI> display aaa statistics offline-reason
19 User request to offline :2
87 AAA cut command :1
Item Description
Format
display access-user [ domain domain-name | interface interface-type interface-
number [ vlan vlan-id [ qinq qinq-vlan-id ] ] | ip-address ip-address [ vpn-
instance vpn-instance-name ] | ipv6-address ipv6-address | access-slot slot-id ]
[ detail ]
display access-user username user-name [ detail ]
display access-user ssid ssid-name (Only the S5720HI support this command.)
display access-user [ mac-address mac-address | service-scheme service-
scheme-name | user-id user-id ]
display access-user statistics (Only the S5720HI support this command.)
NOTE
Parameters
Parameter Description Value
vlan vlan-id [ qinq qinq- Displays information The values of vlan-id and
vlan-id ] about users in a VLAN. qinq-vlan-id are integers
● vlan-id specifies the that range from 1 to
ID of a VLAN. In QinQ 4094.
applications, this
parameter specifies
the inner VLAN ID.
● qinq-vlan-id specifies
the outer VLAN ID.
In the authorized ISP
VLAN scenario, you can
view the user
information only when
the specified VLAN ID is
the ISP VLAN ID.
ssid ssid-name Specifies the SSID for a The SSID must already
service set. exist.
NOTE
SSID is supported only in
the NAC unified mode.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
Precautions
If the character string of the user name contains spaces (for example, a b), you
can run the display access-user username "a b" command to view online users.
If the character string of the user name contains spaces and quotation marks ("")
simultaneously, you cannot use the user name to view online users. In this case,
you can run the display access-user | include username command to view the
user ID of the online user, and then run the display access-user user-id user-id
command to view the user. Alternatively, you can run the cut access-user user-id
user-id command to force the user to go offline.
When displaying VPN user entries based on user IP address, you must set the vpn-
instance vpn-instance-name parameter to specify the VPN instance to which the
IP address belongs.
If user-id is specified, detailed information about the specified user is displayed. If
user-id is not specified, brief information about all online users is displayed,
including the user ID, user name, IP address, and MAC address of each user.
Only letters, digits, and special characters can be displayed for username.
When the value of username contains special characters or characters in other
languages except English, the device displays dots (.) for these characters. If there
are more than three such consecutive characters, three dots (.) are displayed.
Here, the special characters are the ASCII codes smaller than 32 (space) or larger
than 126 (~).
When the value of username is longer than 20 characters, the device displays up
to three dots (.) for the characters following 19; that is, only 22 characters are
displayed.
When interface is specified, the device displays the connection information of
online wired users on the interface.
When querying user information based on interfaces, MAC addresses, or VLANs,
the device only displays information about 802.1X, MAC address, or Portal
authentication users.
Example
# Display information about user sessions on the device.
<HUAWEI> display access-user
-----------------------------------------------------------------------------------------------
UserID Username IP address MAC Status
-----------------------------------------------------------------------------------------------
1 normal@local - 001b-21c4-3b56 Success
62 005500000001 192.168.1.121 0055-0000-0001 Open
32675 fztest - 4611-97a4-0000 Success
16019 b002404 192.168.1.2 0000-c055-0102 Success
-----------------------------------------------------------------------------------------------
Total: 4, printed: 4
NOTE
If you specify the include or exclude parameter in the command, the values of Total and
printed are still the total number of users.
AAA:
User authentication type : MAC authentication
Current authentication method : RADIUS
Current authorization method : -
Current accounting method : RADIUS
AAA:
User authentication type : None
Current authentication method : None
Current authorization method : Local
Current accounting method : None
QinQVlan/UserVlan : 0/18
User access time : 2015/02/11 21:51:58
User accounting session ID : esap_lm000000000001245e5878016032
Option82 information :-
User access type : 802.1x
Redirect ACL ID(Effective) : 3001
User Privilege : 15
AS ID :1
AS name : test
AS IP : 192.168.1.11
AS MAC : 0012-0016-4578
AS Interface : GigabitEthernet0/0/1
Terminal Device Type : Data Terminal
AAA:
User authentication type : 802.1x authentication
Current authentication method : RADIUS
Current authorization method : -
Current accounting method : RADIUS
AAA:
User authentication type : MAC authentication
Current authentication method : RADIUS
Current authorization method : -
Current accounting method : None
Item Description
Item Description
Item Description
Item Description
Item Description
Format
display accounting-scheme [ accounting-scheme-name ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After the accounting scheme configuration is complete, run the display
accounting-scheme command to view the configuration of accounting schemes.
Before applying an accounting scheme to a domain, run the display accounting-
scheme command to check whether configuration of the accounting scheme is
correct.
Precautions
The display accounting-scheme command displays the detailed configuration if
the name of an accounting scheme is specified. Otherwise, this command displays
only the summary of accounting schemes.
Example
# Display the summary of all accounting schemes.
<HUAWEI> display accounting-scheme
-------------------------------------------------------------------
Accounting-scheme-name Accounting-method
-------------------------------------------------------------------
default None
radius-1 RADIUS
tacas-1 HWTACACS
-------------------------------------------------------------------
Total of accounting-scheme: 3
Accounting-scheme-name : default
Accounting-method : None
Realtime-accounting-switch : Disabled
Realtime-accounting-interval(min) :-
Start-accounting-fail-policy : Offline
Realtime-accounting-fail-policy : Online
Realtime-accounting-failure-retries : 3
Item Description
Function
The display authentication ipv6-statistics status command to displays whether
IPv6 statistics collection takes effect.
NOTE
Format
display authentication ipv6-statistics status
Parameters
None
Views
User view
Default Level
1: Monitoring level
Usage Guidelines
After IPv6 traffic statistics collection is globally enabled using the 13.1.17
authentication ipv6-statistics enable command, you can run this command to
check whether the function takes effect.
Example
# Check whether IPv6 traffic statistics collection takes effect.
<HUAWEI> display authentication ipv6-statistics status
-------------------------------------------------------------------------------
Slot-id State
-------------------------------------------------------------------------------
6 success
8 not support
-------------------------------------------------------------------------------
Total: 2
Item Description
Function
The display authentication-scheme command displays the configuration of
authentication schemes.
Format
display authentication-scheme [ authentication-scheme-name ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
Precautions
Example
# Display the summary of all authentication schemes.
<HUAWEI> display authentication-scheme
-------------------------------------------------------------------
Authentication-scheme-name Authentication-method
-------------------------------------------------------------------
default Local
radius RADIUS
-------------------------------------------------------------------
Total of authentication scheme: 2
Authentication-scheme-name : default
Authentication-method : Local
Radius authentication-type of admin : PAP(all)
Format
display authorization-scheme [ authorization-scheme-name ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After the authorization scheme configuration is complete, run the display
authorization-scheme command to view the configuration of authorization
schemes.
Before applying an authorization scheme to a domain, run the display
authorization-scheme command to check whether configuration of the
authorization scheme is correct.
Precautions
The display authorization-scheme command displays the detailed configuration
if the name of an authorization scheme is specified. Otherwise, this command
displays only the summary of authorization schemes.
Example
# Display the summary of all authorization schemes.
<HUAWEI> display authorization-scheme
-------------------------------------------------------------------
Authorization-scheme-name Authorization-method
-------------------------------------------------------------------
default Local
scheme0 Local
-------------------------------------------------------------------
Total of authorization-scheme: 2
Item Description
Function
The display domain command displays the domain configuration.
Format
display domain [ name domain-name ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After a domain is created by the domain command with required parameters
specified, you can run the display domain command to view the domain
configuration.
Example
# Display brief information about all domains.
<HUAWEI> display domain
-------------------------------------------------------------------------
index DomainName
-------------------------------------------------------------------------
0 default
1 default_admin
-------------------------------------------------------------------------
Total: 2
Item Description
Domain-name : default
Domain-index :0
Domain-state : Active
Authentication-scheme-name : default
Accounting-scheme-name : default
Authorization-scheme-name :-
Service-scheme-name :-
RADIUS-server-template :-
HWTACACS-server-template :-
User-group :-
Push-url-address :-
Item Description
Item Description
Function
The display local-user command displays information about local users.
Format
display local-user [ domain domain-name | state { active | block } | username
user-name ] *
Parameters
Parameter Description Value
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The display local-user command output helps you check the configuration of
local users and isolate faults related to the local users.
Precautions
If no parameter is specified, brief information about all local users is displayed. If a
parameter is specified, detailed information about the specified local user is
displayed.
Low-level users cannot view information about high-level users.
Example
# Display brief information about local users.
<HUAWEI> display local-user
----------------------------------------------------------------------------
User-name State AuthMask AdminLevel
----------------------------------------------------------------------------
user-a A A 0
user-c A A 0
----------------------------------------------------------------------------
Total 2 user(s)
NOTE
For a local user who fails to log in to the device but is not locked, Retry-time-left is displayed.
For a local user whose initial password is changed, Change password retry-count-left is
displayed. When the number of continuous login failures or the number of initial password
change failures reaches the limit specified using the 13.1.53 local-aaa-user wrong-password
command, the user is locked.
# Display information about local user user1 who fails to log in to the device.
<HUAWEI> display local-user username
user1
The contents of local user(s):
Password : ****************
State : active
Service-type-mask : T
Privilege level :0
Ftp-directory :-
HTTP-directory :-
Access-limit :-
Accessed-num :0
Idle-timeout :-
Retry-interval : 4 Min(s)
Retry-time-left :1
Original-password : Yes
Password-set-time : 2019-01-27 13:26:55+08:00
Password-expired : No
Password-expire-time : -
Account-expire-time : -
# Display information about local user user1 whose initial password fails to be
changed.
<HUAWEI> display local-user username user1
The contents of local user(s):
Password : ****************
State : active
Service-type-mask : T
Privilege level :0
Ftp-directory :-
HTTP-directory :-
Access-limit :-
Accessed-num :1
Idle-timeout :-
Change password retry-interval : 4 Min(s)
Change password retry-count-left: 3
Original-password : Yes
Password-set-time : 2019-01-27 13:26:55+08:00
Password-expired : No
Password-expire-time : -
Account-expire-time : -
Item Description
Item Description
Change password retry- Retry interval for changing the initial password of a
interval local user before the user is locked.
To configure this parameter, run the 13.1.53 local-
aaa-user wrong-password command.
Related Topics
13.1.54 local-user
Function
The display local-user expire-time command displays the time when local
accounts expire.
Format
display local-user expire-time
Parameters
None
Views
All views
Default Level
3: Management level
Usage Guidelines
The command output helps you diagnose and rectify the faults related to local
user passwords.
Example
# Display the time when local accounts expire.
<HUAWEI> display local-user expire-time
-------------------------------------------------------------------------------
Username Password-expire Account-expire Expired
-------------------------------------------------------------------------------
zsh 2014-12-01 21:25:44 - NO
mm001 2014-12-01 21:29:58 - NO
-------------------------------------------------------------------------------
Total: 2, printed: 2
Item Description
Related Topics
13.1.57 local-user expire-date
13.1.67 password expire
Function
The display local-aaa-user password policy command displays the password
policy of local user.
Format
display local-aaa-user password policy { access-user | administrator }
Parameters
Parameter Description Value
access-user Indicates the password policy of local access users. -
administrator Indicates the password policy of local administrator. -
Views
All views
Default Level
3: Management level
Usage Guidelines
After configuring the password policy for local users, you can run the display
local-aaa-user password policy command to check whether the configuration is
correct.
Example
# Display the password policy of local access users.
<HUAWEI> display local-aaa-user password policy access-user
Password control : Enable
Password history : Enable (history records:5)
Item Description
Item Description
Item Description
Password alert original Whether the device prompt users to change the
initial passwords:
● Enable
● Disable
To configure this function, run the 13.1.66 password
alert original command.
Related Topics
13.1.59 local-aaa-user password policy access-user
13.1.60 local-aaa-user password policy administrator
13.1.67 password expire
13.1.65 password alert before-expire
13.1.66 password alert original
13.1.68 password history record number
Function
The display recording-scheme command displays the configuration of recording
schemes.
Format
display recording-scheme [ recording-scheme-name ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The display recording-scheme command displays the configuration of recording
schemes.
Example
# Display the configuration of the recording scheme scheme0.
<HUAWEI> display recording-scheme scheme0
-----------------------------------------------------------------
Recording-scheme-name : scheme0
HWTACACS-template-name : tacas-1
----------------------------------------------------------------
Related Topics
13.1.70 recording-mode hwtacacs
13.1.71 recording-scheme
Format
display remote-user authen-fail [ blocked | username username ]
Parameters
Parameter Description Value
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
After the account locking function is enabled for the users who fail in AAA remote
authentication, the device records all failed accounts, including:
● The accounts that failed in authentication and are locked, for example, when
the user entered the wrong account name or password too many times.
● The accounts that failed in authentication, but are not locked, for example,
when the number of times the account name or password was entered
incorrectly did not exceed the limit.
Prerequisites
The 13.1.73 remote-aaa-user authen-fail command has been enabled to lock the
accounts that fail in remote AAA authentication.
Precautions
The device cannot back up a recorded account that fails the AAA authentication. If
an active/standby switchover policy has been configured on the device, all user
entries are cleared when the device completes an active/standby switchover.
Example
# Display all accounts that have failed in remote AAA authentication.
<HUAWEI> display remote-user authen-fail
----------------------------------------------------------------------------
Username RetryInterval(Mins) RetryTimeLeft BlockTime(Mins)
----------------------------------------------------------------------------
test@rds 5 2 0
t@rds 0 0 5
----------------------------------------------------------------------------
Total 2, 2 printed
# Display details about the account test that failed in remote AAA authentication.
<HUAWEI> display remote-user authen-fail username test
The contents of the user:
Retry-interval : 0 Min(s)
Retry-time-left : 0
Block-time-left : 4 Min(s)
User-state : Block
Item Description
Related Topics
13.1.73 remote-aaa-user authen-fail
Function
The display service-scheme command displays the configuration of service
schemes.
Format
display service-scheme [ name name ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
The display service-scheme command displays the configuration of service
schemes.
Before applying a service scheme to a domain, run the display service-scheme
command to check whether the service scheme is correct.
Precautions
The display service-scheme command displays the detailed configuration if the
command is executed in the service scheme view or the name of a service scheme
is specified. Otherwise, this command displays only the summary of service
schemes.
Example
# Display information about all service schemes.
<HUAWEI> display service-scheme
-------------------------------------------------------------------
service-scheme-name scheme-index
-------------------------------------------------------------------
svcscheme1 0
svcscheme2 1
-------------------------------------------------------------------
Total of service scheme: 2
service-scheme-name : svcscheme1
service-scheme-primary-dns : -
service-scheme-secondary-dns : -
service-scheme-adminlevel : 15
service-scheme-uclgroup-ID : 10
service-scheme-uclgroup-name : u1
service-scheme-acl-id : 3001
service-scheme-redirect-acl-id: 3001
service-scheme-vlan : 10
service-scheme-voicevlan : enable
Related Topics
13.1.82 service-scheme (AAA view)
Format
dns ip-address [ secondary ]
undo dns [ ip-address ]
Parameters
Parameter Description Value
ip-address The value is in dotted
Specifies the IP address of a DNS server.
decimal notation.
secondary Specifies the secondary DNS server. -
Views
Service scheme view
Default Level
3: Management level
Usage Guidelines
If no DNS server is specified when a local address pool, DHCP server, or RADIUS
server assigns IP addresses to users, the DNS server configured in the service
scheme view is used.
Example
# Set the IP address of the primary DNS server in the service scheme svcscheme1
to 10.10.10.1.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] service-scheme svcscheme1
[HUAWEI-aaa-service-svcscheme1] dns 10.10.10.1
# Set the IP address of the secondary DNS server in the service scheme
svcscheme1 to 10.10.20.1.
<HUAWEI> system-view
[HUAWEI] aaa
Related Topics
13.1.45 display service-scheme
Function
The domain command creates a domain and displays its view.
By default, the device has two domains: default and default_admin. The two
domains can be modified but cannot be deleted.
Format
domain domain-name [ domain-index domain-index ]
Parameters
Parameter Description Value
domain-name Specifies the name of The value is a string of 1 to 64 case-
a domain. insensitive characters. It cannot contain
spaces or the following symbols: * ? ".
The value cannot be - or --.
domain-index Specifies the index of The value is an integer that ranges
domain-index a domain. from 0 to 31.
Views
AAA view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The device can manage users through domains. A domain is the minimum user
management unit. A domain name can be an ISP name or the name of a service
provided by an ISP. A domain can use the default authorization attribute, and be
configured with a RADIUS template and authentication and accounting schemes.
If the domain to be configured already exists, the domain command displays the
domain view.
If a user that belongs to this domain is online, you cannot run the undo domain
command to delete the domain.
Prerequisites
To perform AAA for access users, you need to apply the authentication schemes,
authorization schemes, and accounting schemes in the domain view. Therefore,
authentication, authorization, and accounting schemes must be configured in the
AAA view in advance.
Precautions
● The domain default is a global default common domain for user access, for
example, NAC. By default, the domain is activated, and is bound to the
authentication scheme radius and accounting scheme default, but is not
bound to any authorization scheme.
● The domain default_admin is a global default management domain for users
who log in to the device through HTTPS, SSH, Telnet, and the Web system,
namely, administrators. By default, the domain is activated, and is bound to
the authentication scheme default and accounting scheme default, but is not
bound to any authorization scheme.
Example
# Specify the domain named domain1 and access the domain view.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] domain domain1
[HUAWEI-aaa-domain-domain1]
Related Topics
13.1.39 display domain
Function
The domain command configures a global default domain.
The undo domain command restores the default setting.
By default, there are two global default domains: common domain default and
administrative domain default_admin. The former is used as the global default
domain of access users, while the latter as the global default domain of
administrators.
Format
Common domain default:
domain domain-name
undo domain
Administrative domain default_admin:
domain domain-name admin
undo domain admin
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
After the global default domain is configured, a user must be managed by the
global default domain if their domain cannot be identified.
Precautions
You must create a domain before configuring the domain as the global default
domain.
Example
# Create domain abc and configure it as the global default common domain.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] domain abc
[HUAWEI-aaa-domain-abc] quit
[HUAWEI-aaa] quit
[HUAWEI] domain abc
Related Topics
13.1.47 domain (AAA view)
13.1.49 domain-location
Function
The domain-location command configures the position of a domain name.
The undo domain-location command restores the default position of a domain
name.
By default, the domain name in the AAA view is placed behind the domain name
delimiter, and no position is configured in the authentication profile view.
Format
domain-location { after-delimiter | before-delimiter }
undo domain-location
Parameters
Parameter Description Value
Views
AAA view, authentication profile view
Default Level
In the AAA view, the default level is management level.
In the authentication profile view, the default level is configuration level.
Usage Guidelines
Usage Scenario
The format of a user name is user name@domain name. If before-delimiter is
specified, the format domain name@user name is used.
You can use the domain-location command only when there is no online user.
Precautions
If you run the domain-location command in the AAA view, the position of a
domain is configured globally and the configuration takes effect for all users.
When this command is executed in the authentication profile, the configuration
takes effect only after the authentication profile is bound to a VAP profile.
When the command is executed in the AAA view, the configuration takes effect for
all users. When the command is executed in the authentication profile, the
configuration takes effect for only the users connected to this authentication
profile.
Example
# Configure the domain name before the domain name delimiter.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] domain-location before-delimiter
Related Topics
13.1.32 display aaa configuration
13.1.50 domain-name-delimiter
Function
The domain-name-delimiter command configures a domain name delimiter.
The undo domain-name-delimiter command restores the default domain name
delimiter.
By default, the domain name delimiter in the AAA view is @, and no delimiter is
available in the authentication profile view.
Format
domain-name-delimiter delimiter
undo domain-name-delimiter
Parameters
Parameter Description Value
delimiter Specifies a domain name The value can only be one of the
delimiter of only one bit. following characters: \ / : < > | @ ' %.
Views
AAA view, authentication profile view
Default Level
In the AAA view, the default level is management level.
Usage Guidelines
Usage Scenario
Different AAA servers may use different domain name delimiters. To ensure that
an AAA server obtains the correct user name and domain name, configure the
same domain name delimiter on the device and the AAA server.
For example, if the domain name delimiter is %, the user name of user1 in the
domain dom1 is user1%dom1 or dom1%user1.
Precautions
If you run the domain-name-delimiter command in the AAA view, the domain
name delimiter is configured globally and the configuration takes effect for all
users.
When the command is executed in the AAA view, the configuration takes effect for
all users. When the command is executed in the authentication profile, the
configuration takes effect for only the users connected to this authentication
profile.
Example
# Configure the domain name delimiter as / in the AAA view.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] domain-name-delimiter /
Related Topics
13.1.32 display aaa configuration
13.1.54 local-user
13.1.51 domainname-parse-direction
Function
The domainname-parse-direction command configures the direction in which a
domain name is parsed.
By default, the domain name is parsed in the AAA view from left to right, and no
direction is configured in which a domain name is parsed.
Format
domainname-parse-direction { left-to-right | right-to-left }
undo domainname-parse-direction
Parameters
Parameter Description Value
Views
AAA view, authentication profile view
Default Level
In the AAA view, the default level is management level.
In the authentication profile view, the default level is configuration level.
Usage Guidelines
Usage Scenario
In AAA implementations, users belong to different domains. A network access
server (NAS) centrally manages users in a domain. During a user's login, the NAS
parses the entered user name. A user is authenticated only when the user has the
correct user name and domain name. When configuring an AAA scheme, run the
domainname-parse-direction { left-to-right | right-to-left } command to
configure the direction in which a domain name is parsed.
Assume that the user name is username@dom1@dom2.
● If the domain-location command configures the domain name behind the
domain name delimiter:
– When left-to-right is specified, the user name is username and the
domain name is dom1@dom2.
– When right-to-left is specified, the user name is username@dom1 and
the domain name is dom2.
● If the domain-location command configures the domain name before the
domain name delimiter:
– When left-to-right is specified, the user name is dom1@dom2 and the
domain name is username.
– When right-to-left is specified, the user name is dom2 and the domain
name is username@dom1.
Precautions
When the command is executed in the AAA view, the configuration takes effect for
all users. When the command is executed in the authentication profile, the
configuration takes effect for only the users connected to this authentication
profile.
Example
# Configure the device to parse a domain name from right to left in the AAA view.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] domainname-parse-direction right-to-left
Related Topics
13.1.32 display aaa configuration
Function
The idle-cut command enables the idle-cut function for domain users and sets
the idle-cut parameters.
Format
idle-cut idle-time flow-value [ inbound | outbound ]
undo idle-cut
Parameters
Views
Service scheme view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
If a user uses no or a little network traffic for a long time, the user still occupies
certain bandwidth, which reduces access rate of other users. The idle-cut function
disconnects the users whose traffic volume stays below the traffic threshold within
the idle time, to save resources and improve service experience of other users.
Precautions
● The idle-cut command configured in the service scheme view takes effect
only for administrators.
Example
# Enable the idle-cut function for the domain, and set the idle time to 1 minute
and the traffic threshold to 10 kbytes.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] service-scheme huawei
[HUAWEI-aaa-service-huawei] idle-cut 1 10
Related Topics
13.1.45 display service-scheme
Format
local-aaa-user wrong-password retry-interval retry-interval retry-time retry-
time block-time block-time
undo local-aaa-user wrong-password
Parameters
Parameter Description Value
Views
AAA view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Example
# Enable local account locking, and set the authentication retry interval to 5
minutes, maximum number of consecutive incorrect password attempts to 3, and
account locking period to 5 minutes.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] local-aaa-user wrong-password retry-interval 5 retry-time 3 block-time 5
13.1.54 local-user
Function
The local-user command creates a local user and sets parameters of the local
user.
The undo local-user command deletes a local user.
By default, a local user exists in the system. The irreversible encryption algorithm
is used, the level is 15, and service type is http and terminal. The default username
and password are available in S Series Switches Default Usernames and Passwords
(Enterprise Network or Carrier). If you have not obtained the access permission
of the document, see Help on the website to find out how to obtain it.
Format
local-user user-name { password { cipher | irreversible-cipher } password |
access-limit max-number | ftp-directory directory | idle-timeout minutes
[ seconds ] | privilege level level | state { block | active } | user-group group-
name } *
local-user user-name http-directory directory
undo local-user user-name [ access-limit | ftp-directory | http-directory | idle-
timeout | privilege level | user-group group-name ]
Parameters
Parameter Description Value
Views
AAA view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To facilitate device maintenance, run the local-user command on the device to
create a local user and set parameters such as the password, user level, and FTP
directory.
Prerequisites
Before adding a local user to a user group, ensure that the user group has been
created using the 13.5.156 user-group command.
Precautions
● For device security purposes, change the password periodically.
● Security risks exist if the user login mode is set to Telnet or FTP. You are
advised set the user login mode to STelnet or SFTP and set the user access
type to SSH.
When a device starts without any configuration, HTTP uses the randomly
generated self-signed certificate to support HTTPs. The self-signed certificate
may bring risks. Therefore, you are advised to replace it with the officially
authorized digital certificate.
● After a local administrator logs in to the device, the administrator can create,
modify, or delete attributes of other local users of the same or a lower level.
The attributes include password, user level, maximum number of access users,
and account validity period.
After you change the rights (for example, the password, level, FTP directory,
idle timeout interval, or status) of a local account, the rights of users already
online do not change. The change takes effect when the user next goes
online.
● Online users cannot be deleted. When the user is offline or the cut access-
user username user-name command is executed in the AAA view to
disconnect the user, delete the user.
● The user name function may be invalid due to improper configuration of the
domain name delimiter.
● One user group can be used by multiple local users. However, a local user
belongs to only one user group. If the user groups have been configured for
the local user and in the service template, only the user group configured for
the local user takes effect. The user groups that are used by a local user or an
online user cannot be deleted.
● The idle-cut command configured in the service scheme view takes effect
only for administrators.
Example
# Create a local user user1, and set the domain name to vipdomain, the
password to admin@12345 in cipher text, the maximum number of connections
to 100, and the idle timeout interval to 10 minutes.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] local-user user1@vipdomain password irreversible-cipher admin@12345 access-limit
100 idle-timeout 10
Related Topics
13.1.40 display local-user
Format
local-user change-password
Parameters
None
Views
User view
Default Level
0: Visit level
Usage Guidelines
Usage Scenario
If you are a low-level administrator, to ensure security of the password, you can
run the local-user change-password command in the user view to change your
password after passing the authentication.
Precautions
● To modify the password, a local user must enter the old password.
● After the user that passes local authentication changes the password, the user
must type the new password to pass local authentication.
● The local-user change-password command is used to change the password
of a local user. It does not save the configuration, but the result of changing
the password is saved through the local-user password command. If the
server does not receive old password, new password, or confirmed password
from the user within 30 seconds, it terminates the password change process.
When the user presses Ctrl+C to cancel password change, the password
change process is terminated.
● A simple password of a local user may bring security risks. When a local user
changes the password, the new password must be a string of 8 to 128
characters and must contain at least two types of the following: uppercase
letters, lowercase letters, digits, and special characters. In addition, the new
password cannot be the same as the user name or the user name in a reverse
order.
Example
# The local user changes the password.
<HUAWEI> local-user change-password
Please configure the login password (8-128)
It is recommended that the password consist of at least 2 types of characters, including lowercase letters,
uppercase letters, numer
als and special characters.
Please enter old password:
Please enter new password:
Please confirm new password:
Info: The password is changed successfully.
Function
The local-user device-type command configures the type of terminals allowed to
access the network.
The undo local-user device-type command deletes the type of terminals allowed
to access the network.
By default, the type of terminals allowed to access the network is not configured.
NOTE
Format
local-user user-name device-type device-type &<1-8>
Parameters
Views
AAA view
Default Level
3: Management level
Usage Guidelines
You can run the local-user device-type command to configure the type of
terminals allowed to access the network. In local authentication and
authorization, the device checks whether a terminal is allowed to access the
network. If so, the device checks the user name and password of the terminal.
Example
# Set the type of the terminal that local user hello uses to access the network to
iphone.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] local-user hello device-type iphone
Function
The local-user expire-date command sets the expiration date of a local account.
The undo local-user expire-date command restores the default expiration date of
a local account.
Format
local-user user-name expire-date expire-date
Parameters
Views
AAA view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
After a local account is created, the account has no expiration date by default. You
can run the local-user expire-date command to set the expiration date of a local
account. When the expiration date is reached, the account expires. This
configuration enhances network security.
Precautions
● For example, if the expiration date of the local account is set to 2013-10-1,
the account becomes invalid at 00:00 on 2013-10-1.
● This function takes effect only for users who go online after this function is
successfully configured.
Example
# Set the expiration date of local account [email protected] to 2013/10/1.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] local-user [email protected] expire-date 2013/10/1
Related Topics
13.1.54 local-user
Format
local-user user-name password
NOTE
This command is an interactive command. After you enter local-user user-name password
and press Enter, you can set the password as prompted. The local user password is a string
of 8~128 case-sensitive characters.
Parameters
Parameter Description Value
user-name Specifies the local The value is a string of 1 to 64 case-
user name. insensitive characters. It cannot contain
spaces, asterisk, double quotation mark and
question mark.
Views
AAA view
Default Level
3: Management level
Usage Guidelines
If no password is configured when a local user is created, the password is empty,
and the local user cannot log in to the device.
NOTICE
A simple local user password may bring security risks. The user password must
consist of two types of characters, including uppercase letters, lowercase letters,
numerals, and special characters. In addition, the password cannot be the same as
the user name or user name in a reverse order.
Example
# Set the password to abc@#123456 for the local account [email protected].
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] local-user [email protected] password
Please configure the login password (8-128)
It is recommended that the password consist of at least 2 types of characters, i
ncluding lowercase letters, uppercase letters, numerals and special characters.
Please enter password: //Enter the password abc@#123456
Please confirm password: //Confirm the password abc@#123456
Info: Add a new user.
Related Topics
13.1.40 display local-user
Function
The local-aaa-user password policy access-user command enables the password
policy for local access users and enters the local access user password policy view.
Format
local-aaa-user password policy access-user
Parameters
None
Views
AAA view
Default Level
3: Management level
Usage Guidelines
After a local user is created using the local-user command, the minimum length
and complexity of the password are limited. If you want to improve password
security, run this command to configure password policy. The new password
cannot be the same as any previously used password stored on the device.
Example
# Enable the local access user password policy and enter the local access user
password policy view.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] local-aaa-user password policy access-user
[HUAWEI-aaa-lupp-acc]
Related Topics
13.1.68 password history record number
Function
The local-aaa-user password policy administrator command enables the
password policy for local administrators and enters the local administrator
password policy view.
Format
local-aaa-user password policy administrator
Parameters
None
Views
AAA view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
After a local user is created using the local-user command, the minimum length
and complexity of the password are limited. If you want to improve password
security, you can run the following commands to configure the password policy for
the local administrators:
● Run the password expire command to set the password validity period.
● Run the password alert before-expire command to set the password
expiration prompt days.
● Run the password alert original command to enable the device to prompt
users to change initial passwords.
● Run the password history record number command to set the maximum
number of previously used passwords recorded for each user.
Precautions
In V200R010C00 and later versions, when the device starts with the default
configurations, it automatically performs the following configurations and saves
the configurations to the configuration file:
● Run the local-aaa-user password policy administrator command to enable
the password policy for local administrators.
● Run the password expire 0 command to configure the passwords of local
administrators to be permanently valid.
● Run the password history record number 0 command to configure the
device not to check whether a changed password of a local administrator is
the same as any historical password.
Example
# Enable the local administrator password policy and enter the local administrator
password policy view.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] local-aaa-user password policy administrator
[HUAWEI-aaa-lupp-admin]
Related Topics
13.1.54 local-user
13.1.67 password expire
13.1.65 password alert before-expire
13.1.66 password alert original
13.1.68 password history record number
Function
The local-user service-type command sets the access type for a local user.
The undo local-user service-type command restores the default access type for a
local user.
Format
local-user user-name service-type { 8021x | api | ftp | http | ppp | ssh | telnet |
terminal | web | x25-pad } *
NOTE
Only the S5720EI, S5720HI, S6720EI, and S6720S-EI support the api parameter.
Parameters
Parameter Description Value
Views
AAA view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The device can manage access types of local users. After you specify the access
type of a user, the user can successfully log in only when the configured access
type is the same as the actual access type of the user.
Precautions
● When MAC authentication users use AAA local authentication, the device
does not match or check the access type of local users. However, the access
type must be configured; otherwise, local authentication for MAC address
authentication users fails.
● Security risks exist if the user login mode is set to Telnet or FTP. You are
advised set the user login mode to STelnet or SFTP and set the user access
type to SSH.
When a device starts without any configuration, HTTP uses the randomly
generated self-signed certificate to support HTTPs. The self-signed certificate
may bring risks. Therefore, you are advised to replace it with the officially
authorized digital certificate.
● Common access types cannot be configured together with administrative
access types.
The API access type cannot be configured together with other access types.
If a user has been created and the password uses an irreversible encryption
algorithm, the access type can only be set to an administrative one.
If a user has been created and the password uses a reversible encryption
algorithm, the access type can be set to an administrative or common one.
When the access type is set to an administrative one, the encryption
algorithm of the password is automatically converted into an irreversible
encryption algorithm.
Example
# Set the access type of the local user user1@vipdomain to SSH.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] local-user user1@vipdomain service-type ssh
Related Topics
13.1.54 local-user
13.1.40 display local-user
Format
local-user user-name time-range time-name
undo local-user user-name time-range
Parameters
Parameter Description Value
user-name Indicates the local The value is a string of 1 to 64 case-
account. insensitive characters. It cannot contain
spaces, asterisk, double quotation mark
and question mark.
Views
AAA view
Default Level
3: Management level
Usage Guidelines
Use Scenario
After a local account is created, the account has no expiration date by default. To
restrict the network access time of a local account, run the local-user time-range
command. After the command is executed, the account can access network
resources only in the specified time range.
Prerequisite
The time range has been created using the 14.1.26 time-range command.
Precautions
If you run the local-user time-range and 13.1.57 local-user expire-date
commands in the AAA view multiple times, only the latest configuration takes
effect.
After the access permission time range of an online local user is changed, the
access permission time range of the user will take effect only when the user goes
online next time.
Example
# Set the access permission time segment of local account [email protected] to
9:00-18:00 from Monday to Friday.
<HUAWEI> system-view
[HUAWEI] time-range huawei 9:00 to 18:00 working-day
[HUAWEI] aaa
[HUAWEI-aaa] local-user [email protected] time-range huawei
Related Topics
13.1.40 display local-user
Format
local-user user-name user-type netmanager
undo local-user user-name user-type netmanager
Parameters
Views
AAA view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
When a VTY user logging in to the device is an NMS user, you need to run this
command to set the user type. When the number of login VTY users has reached
the maximum, an NMS user can log in using the reserved VTY numbers 16-20. The
NMS user is allowed to log in to the device only after passing the AAA local
authentication.
Prerequisite
The local user has been created using the local-user command. This user must
pass the AAA local authentication.
Example
# Configure the local user user1@vipdomain as the NMS user.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] local-user user1@vipdomain password cipher Huawei@1234
[HUAWEI-aaa] local-user user1@vipdomain user-type netmanager
Function
The outbound recording-scheme command applies a policy to a recording
scheme to record the connection information.
Format
outbound recording-scheme recording-scheme-name
undo outbound recording-scheme
Parameters
Parameter Description Value
Views
AAA view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Incorrect connections may result in network faults, for example, loops. The
connection information recorded on a server helps you monitor devices. When
network faults occur, you can locate faults based on the connection information
recorded on the server.
Prerequisites
A recording scheme has been created using the recording-scheme command in
the AAA view and an HWTACACS server template has been associated with a
recording scheme using the recording-mode hwtacacs command in the recording
scheme view.
Example
# Apply a policy to the recording scheme scheme to record the connection
information.
<HUAWEI> system-view
[HUAWEI] hwtacacs-server template hw1
[HUAWEI-hwtacacs-hw1] quit
[HUAWEI] aaa
[HUAWEI-aaa] recording-scheme scheme
[HUAWEI-aaa-recording-scheme] recording-mode hwtacacs hw1
[HUAWEI-aaa-recording-scheme] quit
[HUAWEI-aaa] outbound recording-scheme scheme
Related Topics
13.1.43 display recording-scheme
13.1.71 recording-scheme
Format
password alert before-expire day
undo password alert before-expire
Parameters
Parameter Description Value
day Indicates how long the system displays a The value is an integer
prompt before the password expires. that ranges from 0 to
999, in days. The default
If the value is set to 0, the device does not value is 30.
prompt users that the passwords will
expire.
Views
Local administrator password policy view
Default Level
3: Management level
Usage Guidelines
When a user logs in to the device, the device checks how many more days the
password is valid for. If the number of days is less than the prompt days set in this
command, the device notifies the user in how many days the password will expire
and asks the user whether they want to change the password.
● If the user changes the password, the device records the new password and
modification time.
● If the user does not change the password or fails to change the password, the
user can still log in as long as the password has not expired.
Example
# Set the number of password expiration prompt days to 90.
<HUAWEI> system-view
[HUAWEI] aaa
Format
password alert original
undo password alert original
Parameters
None
Views
Local administrator password policy view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To improve device security, use this command to enable the initial password
change prompt function. When a user logs in to the device:
● If the user enters the initial password, the device displays a message to ask
whether to change the initial password. The user can select Y or N:
– If the user selects Y to change the password, the user needs to enter the
old password, new password, and confirm password. The password can
be successfully changed only when the old password is correct and the
new password and confirm password are the same and meet
requirements (password length and complexity). After the password is
changed, the user can log in to the device successfully.
– If the user selects N or fails to change the password, and the initial
password is the default password, the device does not allow the user to
log in. If the initial password is not the default password, the device
allows the user to log in.
● If the entered password is not the initial password, the device does not display
any message and the user can successfully log in.
After the undo password alert original command is executed, the initial
password alert will be disabled, causing a security risk.
NOTE
The initial password may be the default password, the password created by a local user in
the first login, or the password changed by another user (for example, user B changes user
A's password, and user A uses the changed password to log in. The device displays a
prompt message in this situation).
Precautions
This function is only valid for Telnet users, SSH users, and terminal users.
Example
# Enable the device to prompt users to change initial passwords.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] local-aaa-user password policy administrator
[HUAWEI-aaa-lupp-admin] password alert original
Format
password expire day
undo password expire
Parameters
Parameter Description Value
day Indicates the password validity The value is an integer that
period. ranges from 0 to 999, in days.
The default value is 90.
If the value is 0, the password is
permanently valid.
Views
Local administrator password policy view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To improve password security, the administrator can use this command to set the
validity period for local user's password. When the validity period expires, the
password becomes invalid.
If the local user still uses this password to log in to the device, the device allows
the user to log in, prompts the user that the password has expired, and asks the
user whether to change the password:
● If the user selects Y, the user needs to enter the old password, new password,
and confirm password. The password can be successfully changed only when
the old password is correct and the new password and confirm password are
the same and meet requirements (password length and complexity). After the
password is changed, the user can log in to the device successfully.
● If the user selects N or fails to change the password, the user cannot log in.
Precautions
Changing the system time will affect the password validity status.
After this command is executed, the device checks whether the password expires
every minute; therefore, there may be a time difference within 1 minute.
In V200R010C00 and later versions, when the device starts with the default
configurations, it automatically performs the following configurations and saves
the configurations to the configuration file:
● Run the local-aaa-user password policy administrator command to enable
the password policy for local administrators.
● Run the password expire 0 command to configure the passwords of local
administrators to be permanently valid.
● Run the password history record number 0 command to configure the
device not to check whether a changed password of a local administrator is
the same as any historical password.
Example
# Set the password validity period to 120 days.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] local-aaa-user password policy administrator
[HUAWEI-aaa-lupp-admin] password expire 120
Format
password history record number number
Parameters
Parameter Description Value
number Indicates the maximum number of historical The value is an integer
passwords recorded for each user. that ranges from 0 to
12. The default value
If the value is set to 0, the device will not is 5.
check whether a changed password is the
same as any historical password.
Views
Local administrator password policy view, local access user password policy view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Precautions
When the number of recorded historical passwords reaches the maximum value,
the later password will overwrite the earliest password on the device.
After the historical password recording function is disabled, the device does not
record historical passwords; however, the passwords that have been stored are not
deleted.
In V200R010C00 and later versions, when the device starts with the default
configurations, it automatically performs the following configurations and saves
the configurations to the configuration file:
● Run the local-aaa-user password policy administrator command to enable
the password policy for local administrators.
● Run the password expire 0 command to configure the passwords of local
administrators to be permanently valid.
Example
# Set the maximum number of historical passwords recorded for each
administrator to 10.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] local-aaa-user password policy administrator
[HUAWEI-aaa-lupp-admin] password history record number 10
# Set the maximum number of historical passwords recorded for each local access
user to 10.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] local-aaa-user password policy access-user
[HUAWEI-aaa-lupp-acc] password history record number 10
13.1.69 permit-domain
Function
The permit-domain command specifies permitted domains for WLAN users.
The undo permit-domain command deletes the permitted domains of WLAN
users.
By default, no permitted domain is specified for WLAN users.
NOTE
Format
permit-domain name domain-name &<1-4>
undo permit-domain { name domain-name | all }
Parameters
Item Description Value
Views
Authentication profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Prerequisites
Precautions
Example
# Specify permitted domain dom for WLAN users to the authentication profile
john.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] domain dom
[HUAWEI-aaa-domain-dom] quit
[HUAWEI-aaa] quit
[HUAWEI] authentication-profile name john
[HUAWEI-authen-profile-john] permit-domain name dom
Related Topics
13.1.47 domain (AAA view)
Format
recording-mode hwtacacs template-name
undo recording-mode
Parameters
Parameter Description Value
Views
Recording scheme view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The device needs to send the records such as the executed commands, connection
information, and system events to the specified HWTACACS accounting server;
therefore, an HWTACACS server template needs to be associated with a recording
scheme.
Prerequisites
The HWTACACS server template has been created by using the 13.3.13 hwtacacs-
server template command.
Example
# Associate the recording scheme scheme0 with the HWTACACS server template
tacacs1.
<HUAWEI> system-view
[HUAWEI] hwtacacs-server template tacacs1
[HUAWEI-hwtacacs-tacacs1] quit
[HUAWEI] aaa
[HUAWEI-aaa] recording-scheme scheme0
[HUAWEI-aaa-recording-scheme0] recording-mode hwtacacs tacacs1
Related Topics
13.3.3 display hwtacacs-server template
13.1.43 display recording-scheme
13.3.13 hwtacacs-server template
13.1.71 recording-scheme
13.1.71 recording-scheme
Function
The recording-scheme command creates a recording scheme and displays the
recording scheme view.
Format
recording-scheme recording-scheme-name
Parameters
Parameter Description Value
Views
AAA view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
After a recording scheme takes effect, you can view the records such as the
executed commands, connection information, and system-level events on the
recording server. The records help you locate network faults. Because a recording
scheme needs to be associated with an HWTACACS server template, the recording
scheme is configured only when HWTACACS authentication or authorization is
performed.
Follow-up Procedure
Example
# Create a recording scheme scheme0.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] recording-scheme scheme0
[HUAWEI-aaa-recording-scheme0]
Related Topics
13.1.29 cmd recording-scheme
13.1.43 display recording-scheme
13.1.64 outbound recording-scheme
13.1.70 recording-mode hwtacacs
13.1.85 system recording-scheme
13.1.72 redirect-acl
Function
The redirect-acl command configures the ACL used for redirection in a service
scheme.
The undo redirect-acl command deletes the ACL used for redirection in a service
scheme.
By default, no ACL for redirection is configured in the service scheme.
Format
redirect-acl { acl-number | name acl-name }
undo redirect-acl
Parameters
Parameter Description Value
acl-number Specifies the number of The value ranges from 3000 to
the ACL used for 3999 for wired users and from
redirection. 3000 to 3031 for wireless users,
and it must exist.
name acl-name Specifies the name of the The ACL name must exist. The
ACL used for redirection. length ranges from 1 to 64.
Views
Service scheme view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
In some authentication scenarios, after users succeed in authentication, the
administrator needs to redirect HTTP/HTTPS traffic matching ACL permit rules to
the Portal authentication page where users are authenticated again.
Precautions
Before running this command, you are advised to run the 14.1.5 acl (system
view) or 14.1.4 acl name command to create an ACL.
If the ACL is not created before and after this command is run, the redirection ACL
will fail to be delivered.
To redirect HTTPS traffic, run the 13.4.142 portal https-redirect enable
command to configure the HTTPS redirection function.
Example
# Configure ACL 3001 for redirection in the service scheme svcscheme1.
<HUAWEI> system-view
[HUAWEI] acl 3001
[HUAWEI-acl-adv-3001] quit
[HUAWEI] aaa
[HUAWEI-aaa] service-scheme svcscheme1
[HUAWEI-aaa-service-svcscheme1] redirect-acl 3001
Related Topics
13.1.45 display service-scheme
Format
remote-aaa-user authen-fail retry-interval retry-interval retry-time retry-time
block-time block-time
undo remote-aaa-user authen-fail
Parameters
Parameter Description Value
Views
AAA view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To ensure account security, you can enable the device to lock the accounts that
fail in remote AAA authentication. If a user enters incorrect account and password
more than the maximum number of consecutive authentication failures within the
given period, the account is locked. After a certain period, the account is unlocked.
Precautions
● This command is valid only for remote AAA authentication and is invalid for
local authentication.
● In scenarios where an active/standby switchover is performed, the originally
locked account is automatically unlocked.
● After the remote AAA authentication account locking function is disabled
using the undo remote-aaa-user authen-fail command, the originally locked
account is automatically unlocked.
Example
# Enable the remote AAA account locking function, and set the authentication
retry interval to 5 minutes, maximum number of consecutive authentication
failures to 3, and account locking period to 5 minutes.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] remote-aaa-user authen-fail retry-interval 5 retry-time 3 block-time 5
Related Topics
13.1.44 display remote-user authen-fail
13.1.74 remote-user authen-fail unblock
Function
The remote-user authen-fail unblock command unlocks remote AAA
authentication accounts.
Format
remote-user authen-fail unblock { all | username username }
Parameters
Parameter Description Value
Views
AAA view
Default Level
3: Management level
Usage Guidelines
You may need to unlock remote AAA authentication accounts in the following
situations:
● When a user enters an incorrect user name or password fewer times than the
maximum permitted, run the remote-user authen-fail unblock command to
unlock the user and delete the incorrect record of the user from the device.
● When a user is incorrectly locked or needs to be unlocked due to special
reasons, run the remote-user authen-fail unblock command to unlock the
user.
Example
# Unlock the remote AAA authentication account test.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] remote-user authen-fail unblock username test
Related Topics
13.1.44 display remote-user authen-fail
Function
Using the reset aaa command, you can clear records of abnormal offline, user
offline and failure to get online.
Format
reset aaa { abnormal-offline-record | offline-record | online-fail-record }
Parameters
Parameter Description Value
abnormal-offline-record Clears records of user abnormal offline. -
Views
System view
Default Level
3: Management level
Usage Guidelines
This command allows you to clear records of user offline, abnormal offline, and
failure to get online. After the records are cleared, the function of recording
information is enabled.
Example
# Clear user offline records.
<HUAWEI> system-view
[HUAWEI] reset aaa offline-record
Format
reset aaa statistics offline-reason
Parameters
None
Views
All views
Default Level
3: Management level
Usage Guidelines
You can use the reset aaa statistics offline-reason command to delete the
statistics about reasons why users go offline, and then collect new statistics.
Example
# Clear the statistics about reasons why users go offline.
<HUAWEI> reset aaa statistics offline-reason
Function
The reset access-user statistics command deletes the statistics on access user
authentication.
Format
reset access-user statistics
Parameters
None
Views
All views
Default Level
3: Management level
Usage Guidelines
When diagnosing and locating faults related to access user authentication, you
need to collect statistics on user login and logout information within a period of
time. Before the statistics collection, you can run the reset access-user statistics
command to clear the historical statistics, and then run the display access-user
statistics command to view the current statistics.
Example
# Delete the statistics on access user authentication.
<HUAWEI> reset access-user statistics
Function
The reset local-user password history record command clears historical
passwords stored for the local user.
Format
reset local-user [ user-name ] password history record
Parameters
Parameter Description Value
user-name Clears the historical passwords of the specified The local user must
user. exist on the device.
Views
AAA view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
If the administrator wants to record historical passwords of local users again, this
command can be used to clear existing historical passwords.
Precautions
After this command is used, all historical passwords on the device are deleted and
cannot be restored. This operation has security risks, so exercise caution when
using it.
Example
# Clear historical passwords of all local users.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] reset local-user password history record
Related Topics
13.1.68 password history record number
NOTE
Format
security-name enable
Parameters
None
Views
AAA view
Default Level
3: Management level
Usage Guidelines
Some special clients use user names in the format of
username@domain*securitystring in which a security string and a security string
delimiter (*) are added to the user name. To ensure that the AAA server can
identify such user names, run the security-name enable command to enable the
security string function on the device. When sending a user name to the AAA
server, the device deletes *securitystring and only uses username@domain for
authentication.
Example
# Enable the security string function.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] security-name enable
13.1.80 security-name-delimiter
Function
The security-name-delimiter command configures a delimiter for a security
string.
By default, the delimiter for a security string in the AAA view is *, and no delimiter
is available in the authentication profile view.
NOTE
This command only applies to 802.1X users. If the CHAP or PAP authentication is configured
for 802.1X users, the device removes the security string, but does not encapsulate it into the
HW-SecurityStr attribute. If the EAP authentication is configured for 802.1X users, the
device removes the security string and encapsulates it into the HW-SecurityStr attribute.
This function is supported only by S5720HI.
Format
security-name-delimiter delimiter
undo security-name-delimiter
Parameters
Parameter Description Value
Views
AAA view, authentication profile view
Default Level
In the AAA view, the default level is management level.
In the authentication profile view, the default level is configuration level.
Usage Guidelines
Usage Scenario
Some STAs may use the user name in the format of
username@domain*securitystring. * is the security string delimiter. To enable the
AAA server to identify this type of user name, you need to configure a delimiter
for a security string on the device. In this way, when sending the user name to the
AAA server, the device deletes the *securitystring and only uses
username@domain for authentication.
Precautions
When the command is executed in the AAA view, the configuration takes effect for
all users. When the command is executed in the authentication profile, the
configuration takes effect for only the users connected to this authentication
profile.
The delimiter for a security string cannot be the same as the domain name
delimiter.
If you run the security-name-delimiter command in the AAA view, the delimiter
for a security string is configured globally.
Example
# Configure the delimiter for a security string as / in the AAA view.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] security-name-delimiter /
Function
The service-scheme command applies a service scheme to a domain.
Format
service-scheme service-scheme-name
undo service-scheme
Parameters
Parameter Description Value
Views
AAA domain view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The authorization configuration in a service scheme takes effect only when the
service scheme is applied to a domain.
Prerequisites
A service scheme has been created and configured with required parameters.
Example
# Apply the service scheme srvscheme1 to the domain huawei.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] service-scheme srvscheme1
[HUAWEI-aaa-service-srvscheme1] quit
[HUAWEI-aaa] domain huawei
[HUAWEI-aaa-domain-huawei] service-scheme srvscheme1
Related Topics
13.1.45 display service-scheme
13.1.82 service-scheme (AAA view)
Function
The service-scheme command creates a service scheme and displays the service
scheme view.
Format
service-scheme service-scheme-name
Parameters
Parameter Description Value
Views
AAA view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The service scheme is used to assign IP address pool and DNS server parameters
to users.
Follow-up Procedure
Run the service-scheme (AAA domain view) command to apply the service
scheme to a domain.
Precautions
If the service scheme to be configured does not exist, the service-scheme (AAA
view) command creates a service scheme and displays the service scheme view. If
the service scheme to be configured already exists, the service-scheme (AAA
view) command displays the service scheme view.
To delete or modify the service scheme applied to a domain, run the undo
service-scheme (AAA domain view) command to unbind the service scheme
from the domain.
Example
# Create a service scheme srvscheme1.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] service-scheme srvscheme1
[HUAWEI-aaa-service-srvscheme1]
Related Topics
13.1.45 display service-scheme
13.1.81 service-scheme (aaa domain view)
Function
The state command configures the state of a domain.
Format
state { active | block [ time-range time-name &<1-4> ] }
Parameters
Parameter Description Value
Views
AAA domain view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
If exceptions occur during service configuration, set the domain in blocking state
to block access of new users. After the service configuration is complete, set the
domain in active state.
Prerequisite
Before specifying the time-name parameter, ensure that the time range has been
created using the 14.1.26 time-range command.
Precautions
After the state block command is run to set the domain state to block, online
users in the domain are not affected.
After the state block time-range command is run to set the state of a domain
including online users to block, the domain state turns from active to block within
the specified time range, and online users are forced to go offline.
Example
# Set the state of the domain vipdomain to blocking.
<HUAWEI> system-view
[HUAWEI] aaa
# Set the name of the time range in which the vipdomain domain state turns to
block to tim.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] domain vipdomain
[HUAWEI-aaa-domain-vipdomain] state block time-range tim
Warning: This operation may cause online users to go offline. Continue? [Y/N]Y
Related Topics
13.1.47 domain (AAA view)
Function
The statistic enable command enables traffic statistics collection for domain
users.
The undo statistic enable command disables traffic statistics collection for
domain users.
NOTE
Format
statistic enable
Parameters
None
Views
AAA domain view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To implement traffic-based accounting, you can use this command to enable
traffic statistics collection for a domain. Then the device collects traffic statistics
for the users in the domain. If an accounting server is configured, the device sends
traffic statistics to the accounting server through accounting packets so that the
server performs accounting for the users based on traffic statistics.
Follow-up Procedure
Run the 13.1.34 display access-user (All views) command to view traffic
statistics of users.
Precautions
This command collects service statistics for domain users. The device sends the
statistics to the accounting server.
On the S5700LI, S5700S-LI, S1720GW, S1720GW-E, S1720GWR, S1720GWR-E,
S5720LI, and S5720S-LI:
● This statistics collection function is only available for 802.1X authentication
users.
● Traffic statistics are collected based on interfaces.
● The traffic statistics collection is valid for domain users only when interfaces
are physical interface and each interface connects to only one domain user.
● The interface traffic statistics for the first 15s when a user goes online are not
collected.
● When users are online, you cannot run the reset_counters_interface
command to clear interface traffic statistics. Otherwise, the user traffic
statistics are inaccurate.
After this command is run, the device does not collect IPv6 traffic statistics for
users. To enable IPv6 statistics collection, run the authentication ipv6-statistics
enable command.
Example
# Enable traffic statistics collection for domain users.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] domain huawei
[HUAWEI-aaa-domain-huawei] statistic enable
Related Topics
13.1.39 display domain
Format
system recording-scheme recording-scheme-name
undo system recording-scheme
Parameters
Parameter Description Value
Views
AAA view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The system events recorded on an HWTACACS server helps you monitor devices.
When network faults occur, you can isolate faults based on the system events
recorded on the HWTACACS server.
Prerequisites
A recording scheme has been created using the recording-scheme command in
the AAA view and an HWTACACS server template has been associated with a
recording scheme using the recording-mode hwtacacs command in the recording
scheme view.
Precautions
Currently, the device can record only the events caused by the reboot command.
Example
# Apply a policy in the recording scheme scheme to record the system events.
<HUAWEI> system-view
[HUAWEI] hwtacacs-server template hw1
[HUAWEI-hwtacacs-hw1] quit
[HUAWEI] aaa
[HUAWEI-aaa] recording-scheme scheme
[HUAWEI-aaa-recording-scheme] recording-mode hwtacacs hw1
[HUAWEI-aaa-recording-scheme] quit
[HUAWEI-aaa] system recording-scheme scheme
Related Topics
13.1.43 display recording-scheme
13.1.71 recording-scheme
Function
The user-group command binds the users in a domain to the authorization
information of a user group.
The undo user-group command unbinds the users in a domain from the
authorization information of a user group.
By default, no authorization information of a user group is bound to the users in a
domain.
NOTE
Format
user-group group-name
undo user-group
Parameters
Parameter Description Value
group-name Specifies the name of a user group. The user group name must
already exist.
Views
AAA domain view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can run the user-group command in the AAA domain to bind the users in a
domain to the authorization information of a user group.
Precautions
Example
# Bind the user group group1 to the domain test.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] domain test
[HUAWEI-aaa-domain-test] user-group group1
Related Topics
13.5.156 user-group
13.5.157 user-group enable
Function
The user-password complexity-check command enables password complexity
check.
Format
user-password complexity-check
Parameters
None
Views
AAA view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
In the versions earlier than V200R003, the device uses simple user name and
password rules, so the user names and passwords are easy to manage and
remember; however, weak passwords have security risks. In V200R003 and later
versions, the device poses stricter requirements on user names and passwords.
After you create a local user by using the local-user command, the password
must pass a complexity check performed by the device.
In V200R005 and later versions, you can choose whether to enable password
complexity check.
Precautions
To ensure device security, do not disable password complexity check, and change
the password periodically.
Example
# Disable password complexity check.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] undo user-password complexity-check
Related Topics
13.1.54 local-user
Commands provided in this section and all the parameters in the commands are
supported by all switch models by default, unless otherwise specified. For details,
see specific commands.
Function
The called-station-id mac-format command sets the encapsulation format of the
MAC address in the called-station-id (Type 30) attribute of RADIUS packets.
Format
called-station-id mac-format { dot-split | hyphen-split } [ mode1 | mode2 ]
[ lowercase | uppercase ]
Parameters
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
The Called-station-id (Type 30) attribute indicates the MAC address and SSID of
an AP. The default format of the MAC address in the called-station-id attribute of
RADIUS packets from the device is XX-XX-XX-XX-XX-XX. If the RADIUS server does
not support the default format, run the called-station-id mac-format command
to change the format.
Example
# Set the dot as the separator in a MAC address and the encapsulation format of
the MAC address in the called-station-id attribute to XX.XX.XX.XX.XX.XX in
uppercase.
<HUAWEI> system-view
[HUAWEI] radius-server template huawei
[HUAWEI-radius-huawei] called-station-id mac-format dot-split mode2 uppercase
Related Topics
13.2.10 display radius-server configuration
Function
The calling-station-id mac-format command sets the encapsulation format of
the MAC address in the calling-station-id (Type 31) attribute of RADIUS packets.
Format
calling-station-id mac-format { dot-split | hyphen-split | colon-split } [ mode1 |
mode2 ] [ lowercase | uppercase ]
Parameters
Parameter Description Value
dot-split Indicates that the dot (.) is used as the separator in a MAC -
address.
hyphen-split Indicates that the hyphen (-) is used as the separator in a MAC -
address.
colon-split Indicates that the colon (:) is used as the separator in a MAC -
address.
unformatted Indicates that no separator is used in a MAC address. -
mode1 Indicates that the MAC address in the calling-station-id attribute -
uses the "xxxxseparatorxxxxseparatorxxxx" format.
mode2 Indicates that the MAC address in the calling-station-id attribute -
uses the
"xxseparatorxxseparatorxxseparatorxxseparatorxxseparatorxx"
format.
lowercase Indicates that the MAC address in the calling-station-id attribute -
uses the lowercase.
uppercase Indicates that the MAC address in the calling-station-id attribute -
uses the uppercase.
bin Indicates that the MAC address in the calling-station-id attribute -
uses the binary form.
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
The default format of the MAC address in the calling-station-id (Type 31) attribute
of RADIUS packets from the device is xxxx-xxxx-xxxx. If the RADIUS server does
not support the default format, run the calling-station-id mac-format command
to change the format.
Example
# Set the dot as the separator in a MAC address and the encapsulation format of
the MAC address in the calling-station-id attribute to XX.XX.XX.XX.XX.XX in
uppercase.
<HUAWEI> system-view
[HUAWEI] radius-server template huawei
[HUAWEI-radius-huawei] calling-station-id mac-format dot-split mode2 uppercase
Related Topics
13.2.10 display radius-server configuration
Format
display radius-attribute [ name attribute-name | type { attribute-number1 |
huawei attribute-number2 | microsoft attribute-number3 | dslforum attribute-
number4 } ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Before connecting the device to a RADIUS server, run the display radius-attribute
command to view the RADIUS attributes supported by the device. If the device
and RADIUS server support different RADIUS attributes according to the command
output, run the 13.2.16 radius-attribute disable command on the device to
disable RADIUS attributes that are not supported by the RADIUS server or run the
13.2.21 radius-attribute translate command to translate RADIUS attributes.
Example
# Display the RADIUS attributes supported by the device.
<HUAWEI> display radius-attribute
Codes: Auth(Authentication), Acct(Accounting)
Req(Request), Accp(Accept), Rej(Reject)
Resp(Response), COA(Change-of-Authorization)
0(Can not exist in this packet)
1(Can exist in this packet)
--------------------------------------------------------------------------------
Attribute Service Auth Auth Auth Acct Acct COA COA
Name(Type) Type Req Accp Rej Req Resp Req Ack
--------------------------------------------------------------------------------
User-Name(1) All 1 0 0 1 0 1 1
User-Password(2) All 1 0 0 0 0 0 0
CHAP-Password(3) All 1 0 0 0 0 0 0
NAS-IP-Address(4) All 1 0 0 1 0 1 1
NAS-Port(5) All 1 0 0 1 0 1 1
Service-Type(6) All 1 1 0 0 0 0 0
......
NOTE
The preceding information is an example. The displayed attribute type depends on the
actual situation.
Related Topics
13.2.16 radius-attribute disable
13.2.21 radius-attribute translate
Function
The display radius-attribute check command displays the attributes to be
checked in RADIUS Access-Accept packets.
Format
display radius-attribute [ template template-name ] check
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After the radius-attribute check command is executed to configure the attributes
to be checked in RADIUS Access-Accept packets, you can use the display radius-
attribute check command to view these attributes.
Example
# Check the attributes to be checked in RADIUS Access-Accept packets.
<HUAWEI> display radius-attribute check
Server-template-name: test1
--------------------------------------------------
check-attr
--------------------------------------------------
Framed-Protocol
--------------------------------------------------
Item Description
Related Topics
13.2.15 radius-attribute check
Function
The display radius-attribute disable command displays the disabled RADIUS
attributes.
Format
display radius-attribute [ template template-name ] disable
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can use the display radius-attribute disable command to view the RADIUS
attributes disabled by using the radius-attribute disable command.
Example
# Display the disabled RADIUS attributes on the device.
<HUAWEI> display radius-attribute disable
Packet-Type: Type of the RADIUS packets to be modified. 1 indicates valid; 0 ind
icates invalid. Bit 1 to bit 4 indicate the authentication request, authenticati
on accept, accounting request, and accounting response packets.
Server-template-name: d
--------------------------------------------------------------------------------
Source-Vendor-ID Source-Sub-ID Dest-Vendor-ID Dest-Sub-ID Direct Packet-Type
--------------------------------------------------------------------------------
0 7 0 0 send 0000
--------------------------------------------------------------------------------
Item Description
Related Topics
13.2.16 radius-attribute disable
Format
display radius-attribute [ template template-name ] translate
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After running the radius-attribute translate command to configure the device to
translate RADIUS attributes, run the display radius-attribute translate command
to check the configuration.
Example
# Display the RADIUS attribute translation configuration.
<HUAWEI> display radius-attribute translate
Packet-Type: Type of the RADIUS packets to be modified. 1 indicates valid; 0 indicates invalid. Bit 1 to bit 4
indicate the authentication request, authentication accept, accounting request, and accounting response
packets.
Server-template-name: rds
--------------------------------------------------------------------------------
Source-Vendor-ID Source-Sub-ID Dest-Vendor-ID Dest-Sub-ID Direct Packet-Type
--------------------------------------------------------------------------------
0 6 0 40 receive 0 0 0 0
--------------------------------------------------------------------------------
Server-template-name: eee
--------------------------------------------------------------------------------
Source-Vendor-ID Source-Sub-ID Dest-Vendor-ID Dest-Sub-ID Direct Packet-Type
--------------------------------------------------------------------------------
234567 123 2011 20 -- 0101
--------------------------------------------------------------------------------
Item Description
Related Topics
13.2.21 radius-attribute translate
Function
The display radius-server accounting-stop-packet command displays
information about accounting-stop packets on the RADIUS server.
Format
display radius-server accounting-stop-packet { all | ip { ip-address | ipv6-
address } }
Parameters
Parameter Description Value
Views
All views
Default Level
3: Management level
Usage Guidelines
The display radius-server accounting-stop-packet command output helps you
check configurations or isolate faults.
Example
# Display the accounting-stop packets with the IP address being 10.138.104.32.
<HUAWEI> display radius-server accounting-stop-packet ip 10.138.104.32
------------------------------------------------------------------------------
Time Stamp Resend Times Session Time Username
------------------------------------------------------------------------------
1980409 6 22 g@rds
------------------------------------------------------------------------------
Total: 1, printed: 1
Item Description
Item Description
Related Topics
13.2.24 radius-server accounting-stop-packet resend
13.2.49 reset radius-server accounting-stop-packet
Format
display radius-server authorization configuration
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After running the radius-server authorization command to configure an
authorization server, run the display radius-server authorization configuration
command to check whether the authorization server configuration is correct.
Example
# Display the configuration of RADIUS authorization servers.
<HUAWEI> display radius-server authorization configuration
------------------------------------------------------------------------------
IP-Address Shared-key Group Ack-reserved-interval
------------------------------------------------------------------------------
10.10.1.114 **************** - 20
vpn-instance : -
------------------------------------------------------------------------------
1 RADIUS authorization server(s) in total
Related Topics
13.2.29 radius-server authorization
Format
display radius-server configuration [ template template-name ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After the configuration of a RADIUS server template is completed or a RADIUS
fault needs to be rectified, you can run this command to check whether the
configuration of the RADIUS server template is correct.
Example
# Display configuration information about the RADIUS server template named
shiva.
<HUAWEI> display radius-server configuration template shiva
------------------------------------------------------------------------------
Server-template-name : shiva
Protocol-version : standard
Traffic-unit : B
Shared-secret-key : %^%#O09i(W[^YT4g#Z37Nct9$IK#TH(-B6-1|<;q|D)"%^%#
Group-filter : class
Timeout-interval(in second) : 5
Retransmission : 2
EndPacketSendTime : 0
Dead time(in minute) : 5
Domain-included : YES
NAS-IP-Address : -
Calling-station-id MAC-format : xxxx-xxxx-xxxx
Called-station-id MAC-format : XX.XX.XX.XX.XX.XX
NAS-Port-ID format : New
Service-type : -
NAS-IPv6-Address : ::
Server algorithm : master-backup
Detect-interval(in second) : 60
Testuser-username : huawei
Testuser-ciperpwd : %^%#.5*EDl^j_WXg[#Z>plj8;k|8.s*ju<_F~g9k`0*9%^%#
Item Description
Item Description
Item Description
Function
The display radius-server dead-interval dead-count command displays
configuration information about the RADIUS server detection interval and
maximum number of consecutive unacknowledged packets in each detection
interval.
Format
display radius-server { dead-interval | dead-count }
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After the RADIUS server detection interval and maximum number of consecutive
unacknowledged packets in each detection interval are configured using the
13.2.33 radius-server dead-interval dead-count command, you can run the
display radius-server { dead-interval | dead-count } command to check
configuration information about the RADIUS server detection interval and
maximum number of consecutive unacknowledged packets in each detection
interval.
Example
# Display configuration information about the RADIUS server detection interval.
<HUAWEI> display radius-server dead-interval
Radius server state detected internal is 5.
Item Description
Function
The display radius-server item command shows the RADIUS server configuration.
Format
display radius-server item { ip-address { ipv4-address | ipv6-address }
{ accounting | authentication } | template template-name }
Parameters
Parameter Description Value
Views
ALL views
Default Level
3: Management level
Usage Guidelines
The display radius-server item command shows the RADIUS server configuration.
Example
# Display the configuration of RADIUS server template rds.
<HUAWEI> display radius-server item template rds
------------------------------------------------------------------------------
Type = auth-server
State = state-up
AlarmFlag = false
STUseNum = 1
IPAddress = 192.168.30.1
AlarmTimer = 0xffffffff
Head = 1057
Tail = 1311
ProbeID = 255
Type = acct-server
State = state-up
AlarmFlag = false
STUseNum = 1
IPAddress = 192.168.30.1
AlarmTimer = 0xffffffff
Head = 1057
Tail = 1311
ProbeID = 255
------------------------------------------------------------------------------
Item Description
Item Description
Function
The display radius-server session-manage configuration command displays
session management configuration on the RADIUS server.
Format
display radius-server session-manage configuration
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After session management is enabled using the radius-server session-manage
command on the RADIUS server, you can run this command to view session
management configuration.
Example
# Display session management configuration on the RADIUS server.
<HUAWEI> display radius-server session-manage configuration
------------------------------------------------------------------------------
Session Manage Enable : True Session Manage AnyServer : False
------------------------------------------------------------------------------
IP Address VPN Instance Shared-key
------------------------------------------------------------------------------
10.1.1.1 - ****************
------------------------------------------------------------------------------
1 Radius session manage server(s) in total
Function
The display snmp-agent trap feature-name radius all command displays the
status of all traps on the RDS module.
Format
display snmp-agent trap feature-name radius all
Parameters
None
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
After enabling the trap function for the RDS module, you can run this command
to check the status of all traps on the RDS module. To enable the trap function for
the RDS module, run the snmp-agent trap enable feature-name radius
command.
Prerequisites
Example
# Display the status of all traps on the RDS module.
<HUAWEI>display snmp-agent trap feature-name radius all
------------------------------------------------------------------------------
Feature name: radius
Trap number : 4
------------------------------------------------------------------------------
Trap name Default switch status Current switch status
hwRadiusAuthServerUp off off
hwRadiusAuthServerDown off off
hwRadiusAcctServerUp off off
hwRadiusAcctServerDown off off
Item Description
Related Topics
13.2.50 snmp-agent trap enable feature-name radius
Format
radius-attribute check attribute-name
undo radius-attribute check [ attribute-name ]
Parameters
Parameter Description Value
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
After the radius-attribute check command is executed, the device checks whether
the received RADIUS Access-Accept packets contain the specified attributes. If yes,
the device considers that authentication was successful; if not, the device
considers that authentication failed and discards the packet. For example, after
the radius-attribute check filter-id command is executed, the device checks the
filter-id attribute in the received RADIUS Access-Accept packets. If a RADIUS
packet does not contain this attribute, authentication fails.
Precautions
● When you use the undo radius-attribute check command with parameters,
the device checks the specified attributes in the RADIUS Access-Accept
packets. When you use the undo radius-attribute check command without
any parameter, the device does not check RADIUS Access-Accept packets.
● The display radius-attribute can display RADIUS attribute names.
Example
# Check whether the RADIUS Access-Accept packets contain the framed-protocol
attribute.
<HUAWEI> system-view
[HUAWEI] radius-server template test1
[HUAWEI-radius-test1] radius-attribute check framed-protocol
Related Topics
13.2.4 display radius-attribute
Format
radius-attribute disable attribute-name { receive | send } *
Parameters
Parameter Description Value
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Generally, a RADIUS server connects to multiple network devices, which can be
one vendor's devices or different vendors' devices. If some vendors' devices require
the RADIUS server to deliver an attribute to support a specified feature but other
vendors' device do not support the delivered attribute, the RADIUS attribute may
fail to be parsed.
The device may communicate with RADIUS servers of different vendors. Some
RADIUS servers require the device to send some attributes but other RADIUS
servers cannot process the attributes. Errors may occur.
Prerequisites
The RADIUS attribute translation function has been enabled using the 13.2.27
radius-server attribute translate command.
Precautions
Example
# Disable the Frame-Route attribute in sent packets.
<HUAWEI> system-view
[HUAWEI] radius-server template test1
[HUAWEI-radius-test1] radius-server attribute translate
[HUAWEI-radius-test1] radius-attribute disable framed-route send
Related Topics
13.2.4 display radius-attribute
13.2.45 radius-server template
Function
The radius-attribute nas-ip command sets the NAS-IP-Address attribute in a
RADIUS packet sent from an NAS.
By default, the source IP address of the NAS is the NAS-IP-Address attribute value.
Format
radius-attribute nas-ip ip-address
Parameters
Parameter Description Value
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Prerequisites
A RADIUS server template has been created using the radius-server template
command.
Precautions
Example
# Set the RADIUS NAS-IP-Address attribute.
<HUAWEI> system-view
[HUAWEI] radius-server template temp1
[HUAWEI-radius-temp1] radius-attribute nas-ip 10.3.3.3
Related Topics
13.2.10 display radius-server configuration
Function
The radius-attribute nas-ipv6 command sets the NAS-IPv6-Address attribute in a
RADIUS packet sent from a network access server (NAS).
Format
radius-attribute nas-ipv6 ipv6-address
Parameters
Parameter Description Value
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The RADIUS server uses IP addresses to identify different NASs. The NAS-IPv6-
Address attribute in a RADIUS packet can be configured using the radius-
attribute nas-ipv6 command in the RADIUS template.
Prerequisites
A RADIUS server template has been created using the radius-server template
command.
Precautions
Example
# Set the RADIUS NAS-IPv6-Address attribute.
<HUAWEI> system-view
[HUAWEI] radius-server template temp1
[HUAWEI-radius-temp1] radius-attribute nas-ipv6 FC00::7
Related Topics
13.2.10 display radius-server configuration
Format
radius-attribute service-type with-authenonly-reauthen
undo radius-attribute service-type with-authenonly-reauthen
Parameters
None
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
A large number of users are online at the same time and each user has a lot of
authorization information. If the users need to be reauthenticated, the device
delivers authorization information to each user after the authentication is
successful. It is difficult for the device to process a lot of authorization
information. As a result, users go offline due to authorization failures. After the
radius-attribute service-type with-authenonly-reauthen command is run in the
RADIUS server template view, the device only reauthenticates users during
reauthentication, and does not redeliver authorization information, preventing
users from going offline due to authorization failures.
Precautions
After this command is configured, users still use the original authorization
information after being successfully reauthenticated even if the user authorization
information changes.
This function takes effect after the Service-Type attribute on the RADIUS server is
set to Authenticate Only.
Example
# Set the reauthentication mode to reauthentication only.
<HUAWEI> system-view
[HUAWEI] radius-server template test
[HUAWEI-radius-test] radius-attribute service-type with-authenonly-reauthen
Related Topics
13.2.10 display radius-server configuration
Function
The radius-attribute set command modifies the RADIUS attributes.
The undo radius-attribute set command restores the default RADIUS attributes.
Format
radius-attribute set attribute-name attribute-value [ auth-type mac | user-type
ipsession ]
Parameters
Parameter Description Value
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The RADIUS attribute values of different vendors are different. To ensure that
Huawei device can successfully communicate with the devices of other vendors,
run the radius-attribute set command to modify the RADIUS attribute values.
Precautions
● The radius-attribute set command can modify only the RADIUS attributes in
the authentication or accounting request packets sent from a device to the
RADIUS server, and cannot modify the RADIUS attributes in the packets sent
from the RADIUS server to a device.
If you run the display radius-attribute command to check the RADIUS
attributes supported by a device and the Auth Req or Acct Req field in the
command output displays 1, the RADIUS attributes supported by the device
can be carried in the authentication or accounting request packets sent from
the device to the RADIUS server.
Among the RADIUS attributes that can be carried in the authentication or
accounting packets sent from the device to the RADIUS server, you cannot run
the radius-attribute set command to modify the following attributes: User-
Password, Agent-Circuit-Id, Agent-Remote-Id, NAS-IP-Address, NAS-IPv6-
Address, CHAP-Password, CHAP-Challenge, EAP-Message, Framed-Interface-
Id, Framed-IPv6-Prefix, and Message-Authenticator.
● The type of the attribute modified by the radius-attribute set command
cannot be changed.
Example
# Create the template temp1 and set the Service-Type attribute value to 1.
<HUAWEI> system-view
[HUAWEI] radius-server template temp1
[HUAWEI-radius-temp1] radius-attribute set service-type 1
Related Topics
13.2.45 radius-server template
Format
radius-attribute translate src-attribute-name dest-attribute-name { receive |
send | access-accept | access-request | account-request | account-response } *
Parameters
Parameter Description Value
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Prerequisites
Precautions
Example
# Configure the device to translate NAS-Identifier into NAS-Port-Id when sending
RADIUS packets.
<HUAWEI> system-view
[HUAWEI] radius-server template temp1
[HUAWEI-radius-temp1] radius-server attribute translate
[HUAWEI-radius-temp1] radius-attribute translate nas-identifier nas-port-id send
Related Topics
13.2.4 display radius-attribute
13.2.7 display radius-attribute translate
13.2.27 radius-server attribute translate
13.2.45 radius-server template
Format
radius-server template-name
undo radius-server
Parameters
Parameter Description Value
Views
AAA domain view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To perform RADIUS authentication and accounting for users in a domain, apply a
RADIUS server template to the domain. A RADIUS server template takes effect
only after the RADIUS server template is applied to a domain.
Prerequisites
A RADIUS server template has been created using the 13.2.45 radius-server
template command.
Example
# Apply the RADIUS server template template1 to the domain radius1.
<HUAWEI> system-view
[HUAWEI] radius-server template template1
[HUAWEI-radius-template1] quit
[HUAWEI] aaa
[HUAWEI-aaa] domain radius1
[HUAWEI-aaa-domain-radius1] radius-server template1
Related Topics
13.2.10 display radius-server configuration
13.2.45 radius-server template
Format
radius-server accounting ipv4-address port [ vpn-instance vpn-instance-name |
source { loopback interface-number | ip-address ipv4-address | vlanif interface-
number } | weight weight-value ] *
radius-server accounting ipv6-address port [ source { loopback interface-
number | ip-address ipv6-address | vlanif interface-number } | weight weight-
value ] *
undo radius-server accounting [ ipv4-address [ port [ vpn-instance vpn-
instance-name | source { loopback interface-number | ip-address ipv4-address |
vlanif interface-number } | weight ] * ] ]
undo radius-server accounting [ ipv6-address [ port [ source { loopback
interface-number | ip-address ipv6-address | vlanif interface-number } |
weight ] ] ]
NOTE
Parameters
Parameter Description Value
source ip-address ipv4- Specifies the source IPv4 The value is a valid
address address in RADIUS unicast address in dotted
packets sent from the decimal notation.
device to a RADIUS
accounting server.
If this parameter is
specified, ensure that the
value of this parameter
is the same as the
client's IPv4 address
specified on the RADIUS
accounting server.
If this parameter is not
specified, the IPv4
address of the outbound
interface is used as the
source IPv4 address in
RADIUS packets sent
from the device to a
RADIUS accounting
server.
source ip-address ipv6- Specifies the source IPv6 The value is a 32-digit
address address in RADIUS hexadecimal number, in
packets sent from the the format
device to a RADIUS X:X:X:X:X:X:X:X.
accounting server.
If this parameter is not
specified, the IPv6
address of the outbound
interface is used as the
source IPv6 address in
RADIUS packets sent
from the device to a
RADIUS accounting
server.
This address cannot be a
virtual IPv6 address of a
VRRP6 group.
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To perform accounting for users, configure a RADIUS accounting server. The device
communicates with a RADIUS accounting server to obtain accounting information,
and performs accounting for users based on the accounting information. The
device sends accounting packets to the RADIUS accounting server only after the IP
address and port number of the RADIUS accounting server are specified in the
RADIUS server template.
Precautions
The IP address of the primary accounting server must be different from the IP
address of the secondary accounting server; otherwise, the configuration fails.
Example
# Configure the primary RADIUS accounting server.
<HUAWEI> system-view
[HUAWEI] radius-server template group1
[HUAWEI-radius-group1] radius-server accounting 10.163.155.12 1813
Related Topics
13.2.10 display radius-server configuration
NOTE
Format
radius-server accounting-stop-packet resend [ resend-times ]
undo radius-server accounting-stop-packet resend
Parameters
Parameter Description Value
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
When accounting-stop packets cannot be sent to the RADIUS server that is
unreachable, you can run the radius-server accounting-stop-packet resend
command to save the accounting-stop packets in the buffer and send them at the
preset intervals until the number of allowed retransmission times is reached or the
packets are sent successfully.
Example
# Enable the retransmission of accounting-stop packets and set the number of
accounting-stop packets that can be retransmitted each time to 50.
<HUAWEI> system-view
[HUAWEI] radius-server template test1
[HUAWEI-radius-test1] radius-server accounting-stop-packet resend 50
Related Topics
13.2.10 display radius-server configuration
Function
The radius-server algorithm command configures the algorithm for selecting
RADIUS servers.
The undo radius-server algorithm command restores the default algorithm for
selecting RADIUS servers.
Format
radius-server algorithm { loading-share [ based-user ] | master-backup }
Parameters
Parameter Description Value
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
When two or more than two RADIUS servers are available, you can use the
radius-server algorithm command to set the algorithm for selecting RADIUS
servers.
● When master-backup is specified, the weight is used to determine the
primary and secondary RADIUS authentication or accounting servers. The
server with a larger weight value is the primary server. If devices have the
same weight, the server that was first configured is the primary server.
● When loading-share is specified, the device sends a packet to a server
according to the weights configured on servers. For example, if the weights of
RADIUS server A, RADIUS server B, and RADIUS server C are 80, 80, and 40
respectively, the probabilities of sending packets to RADIUS server A, RADIUS
server B, and RADIUS server C are as follows:
– RADIUS server A: 80/(80 + 80 + 40) = 40%
– RADIUS server B: 80/(80 + 80 + 40) = 40%
– RADIUS server C: 40/(80 + 80 + 40) = 20%
If the algorithm for selecting RADIUS servers is configured as single user-
based load balancing, authentication server information is saved in the
authentication phase, and the device preferentially sends an accounting
request to the accounting server in the accounting phase when the
accounting server is the same as the authentication server. If the algorithm
for selecting RADIUS servers is configured as packet-based load balancing,
authentication server information is not saved in the authentication phase,
and the accounting server is reselected based on the algorithm in the
accounting phase, which may result in that authentication and accounting for
a user is not performed on the same server.
Precautions
If you run the radius-server algorithm command multiple times in the same
RADIUS server template view, only the latest configuration takes effect.
Example
# Set the algorithm for selecting RADIUS servers to load balancing.
<HUAWEI> system-view
[HUAWEI] radius-server template template1
[HUAWEI-radius-template1] radius-server algorithm loading-share
Related Topics
13.2.10 display radius-server configuration
Function
The radius-server attribute message-authenticator access-request command
carries the Message-Authenticator attribute in RADIUS authentication packets sent
by the device.
Format
radius-server attribute message-authenticator access-request
Parameters
None
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
The Message-Authenticator attribute is used to identify and verify authentication
packets to prevent invalid packets.
NOTE
Example
# Configure the Message-Authenticator attribute to RADIUS authentication
packets.
<HUAWEI> system-view
[HUAWEI] radius-server template test1
[HUAWEI-radius-test1] radius-server attribute message-authenticator access-request
Function
The radius-server attribute translate command enables RADIUS attribute
translation.
Format
radius-server attribute translate
Parameters
None
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Follow-up Procedure
Example
# Enable RADIUS attribute translation.
<HUAWEI> system-view
[HUAWEI] radius-server template test1
[HUAWEI-radius-test1] radius-server attribute translate
Related Topics
13.2.21 radius-attribute translate
13.2.45 radius-server template
Function
The radius-server authentication command configures a RADIUS authentication
server.
Format
radius-server authentication ipv4-address port [ vpn-instance vpn-instance-
name | source { loopback interface-number | ip-address ipv4-address | vlanif
interface-number } | weight weight-value ] *
NOTE
Parameters
Parameter Description Value
source ip-address ipv4- Specifies the source IPv4 The value is a valid
address address in RADIUS unicast address in dotted
packets sent from the decimal notation.
device to a RADIUS
authentication server.
If this parameter is
specified, ensure that the
value of this parameter
is the same as the
client's IPv4 address
specified on the RADIUS
authentication server.
If this parameter is not
specified, the IPv4
address of the outbound
interface is used as the
source IPv4 address in
RADIUS packets sent
from the device to a
RADIUS authentication
server.
source ip-address ipv6- Specifies the source IPv6 The value is a 32-digit
address address in RADIUS hexadecimal number, in
packets sent from the the format
device to a RADIUS X:X:X:X:X:X:X:X.
authentication server.
If this parameter is not
specified, the IPv6
address of the outbound
interface is used as the
source IPv6 address in
RADIUS packets sent
from the device to a
RADIUS authentication
server.
This address cannot be a
virtual IPv6 address of a
VRRP6 group.
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
To perform RADIUS authentication, configure a RADIUS authentication server in a
RADIUS server template. The device uses the RADIUS protocol to communicate
with a RADIUS authentication server to obtain authentication information, and
authenticates users based on the authentication information. The device sends
authentication packets to the RADIUS authentication server only after the IP
address and port number of the RADIUS authentication server are specified in the
RADIUS server template.
When the 802.1x authentication mode is set to EAP, the device and RADIUS
authentication servers exchange packets multiple times. During the first exchange
process, the device sends a request packet to the primary RADIUS authentication
server. If the device resends the request packet for the maximum number of times
but does not receive a response packet from the primary RADIUS authentication
server, the device sends a request packet to the secondary RADIUS authentication
server. If the secondary RADIUS authentication server sends a response packet to
the device, the device will directly send request packets to the secondary RADIUS
authentication server in the following exchange processes. In this way, the device
does not need to send a request packet to the primary RADIUS authentication
server first in the following exchange processes, shortening the authentication
time and preventing the user authentication connection from being disconnected
because the client does not receive a response packet for a long time.
Example
# Configure the IP address of the primary RADIUS authentication server to
10.163.155.13 and the port number to 1812.
<HUAWEI> system-view
[HUAWEI] radius-server template group1
[HUAWEI-radius-group1] radius-server authentication 10.163.155.13 1812
Related Topics
13.2.10 display radius-server configuration
Format
radius-server authorization ip-address [ vpn-instance vpn-instance-name ]
{ server-group group-name shared-key cipher key-string | shared-key cipher
key-string [ server-group group-name ] } [ ack-reserved-interval interval ]
undo radius-server authorization { all | ip-address [ vpn-instance vpn-instance-
name ] }
NOTE
Parameters
Parameter Description Value
shared-key cipher key- Specifies the shared key The value is a case-
string of a RADIUS server. sensitive character string
without spaces or
question marks (?). key-
string can be a string of
1 to 128 characters in
plain text or a string of
48, 68, 88, 108, 128, 148,
168, or 188 characters in
cipher text.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
After the parameters such as IP address and shared key are configured for the
RADIUS authorization server, the device can receive authorization requests from
the server and grant rights to users according to the authorization information.
After authorization is complete, the device returns authorization response packets
carrying the results to the server.
Precautions
Example
# Specify a RADIUS authorization server.
<HUAWEI> system-view
[HUAWEI] radius-server authorization 10.1.1.116 shared-key cipher Huawei@2012
Related Topics
13.2.9 display radius-server authorization configuration
13.2.45 radius-server template
Function
The radius-server authorization attribute-decode-sameastemplate command
configures the device to parse RADIUS dynamic authorization packet attributes
based on the configuration in RADIUS server template.
Format
radius-server authorization attribute-decode-sameastemplate
Parameters
None.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The device parses the MAC address in the Calling-Station-Id attribute in RADIUS
dynamic authorization packets. By default, the MAC address format that can be
parsed is configured using the radius-server authorization calling-station-id
decode-mac-format command in the system view. When the device is connected
to multiple RADIUS servers, the MAC address formats are different in the Calling-
Station-Id attribute in dynamic authorization packets sent by different RADIUS
servers. In this case, the MAC address may fail to be parsed if the same parse
mode is used, resulting in that the device fails to be connected to some RADIUS
servers. You can run the radius-server authorization attribute-decode-
sameastemplate command to configure the device to parse RADIUS dynamic
authorization packet attributes based on the Calling-Station-Id attribute
encapsulation mode configured in each RADIUS server template, making the
device be successfully connected to multiple RADIUS servers.
Prerequisites
This function is used to make the Calling-Station-Id attribute parse mode the
same as the Calling-Station-Id attribute encapsulation mode configured in RADIUS
server template. Therefore, make sure that the following steps have been
performed before using this function.
1. The calling-station-id mac-format command has been run in the RADIUS
server template view to configure the encapsulation mode of the MAC
address in the Calling-Station-Id attribute.
2. The radius-server authorization command has been run in the system view
to configure the authorization server to use the RADIUS server template
server-group.
NOTE
If the RADIUS server template used by the authorization server is not specified, this function
cannot be implemented on a device. You can run the radius-server authorization calling-
station-id decode-mac-format command in the system view to configure the Calling-Station-Id
attribute parse mode.
Precautions
The configuration in a RADIUS server template has a higher priority than the
global configuration.
Example
# Configure the RADIUS authorization server to parse attributes depending on the
configuration in a RADIUS template.
<HUAWEI> system-view
[HUAWEI] radius-server authorization attribute-decode-sameastemplate
Format
radius-server authorization calling-station-id decode-mac-format { bin | ascii
{ unformatted | { dot-split | hyphen-split } [ common | compress ] } }
undo radius-server authorization calling-station-id decode-mac-format
Parameters
Parameter Description Value
bin Indicates that the MAC address in the calling-station-id attribute -
uses the binary format.
ascii Indicates that the MAC address in the calling-station-id attribute -
uses the ASCII format.
unformatted Indicates that no separator is used in the MAC address in the -
calling-station-id field.
dot-split Indicates that dots are used as the separators in MAC address. -
hyphen-split Indicates that the hyphens are used as the separators in MAC -
address.
common Indicates that the MAC address in the calling-station-id attribute -
uses the
"xxseparatorxxseparatorxxseparatorxxseparatorxxseparatorxx"
format.
compress Indicates that the MAC address in the calling-station-id attribute -
uses the "xxxxseparatorxxxxseparatorxxxx" format.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
By default, the MAC address format in the calling-station-id attribute carried in
RADIUS dynamic authorization packets is xxxxxxxxxxxx. If the MAC address format
in the calling-station-id attribute sent by the RADIUS server is not the default
format used on the device, run the radius-server authorization calling-station-id
decode-mac-format command to change the MAC address format on the device.
When a device connects to multiple RADIUS servers, the RADIUS servers may send
MAC addresses in different formats in the calling-station-id attribute to the device.
You need to run the radius-server authorization attribute-decode-
sameastemplate command to configure the device to parse the RADIUS
authorization packet attributes based on the configuration in RADIUS server
template, so that the device can work with these RADIUS servers.
Precautions
The configuration in a RADIUS server template has a higher priority than the
global configuration.
Example
# Set the format of MAC address that can be parsed by the device in the calling-
station-id attribute to binary.
<HUAWEI> system-view
[HUAWEI] radius-server authorization calling-station-id decode-mac-format bin
Function
The radius-server dead-detect-condition by-server-ip command configures
keepalive detection for RADIUS server based on the RADIUS server IP address.
The undo radius-server dead-detect-condition by-server-ip command restores
the default setting.
By default, keepalive detection is performed for only RADIUS authentication
server.
Format
radius-server dead-detect-condition by-server-ip
undo radius-server dead-detect-condition by-server-ip
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The device periodically sends authentication request packets to the RADIUS server
in Down state. If the RADIUS server responds, the device sets the RADIUS
authentication server status to Up. The device does not perform keepalive
detection for RADIUS accounting servers in Down state. Instead, the device sets
the RADIUS accounting server status to Up only when the server recovery time
expires.
To allow the device to promptly detect the status of RADIUS accounting servers
that are in Down state, run the radius-server dead-detect-condition by-server-ip
command. After the command is executed, the device performs keepalive
detection on RADIUS servers based on the RADIUS server IP address, so that the
status of RADIUS accounting server is associated with the status of authentication
server.
Precautions
After the radius-server dead-detect-condition by-server-ip command is
executed, run the radius-server testuser command to configure automatic user
detection.
When detecting the Down states of RADIUS authentication and accounting
servers, the device counts the numbers of authentication and accounting request
packets separately. After the radius-server dead-detect-condition by-server-ip
command is executed, if the authentication and accounting servers sharing the
same IP address are in the same VPN instance, the device accumulates the
number of authentication and accounting packets sent by the servers. In addition,
the status of RADIUS authentication server with the same IP address in the same
VPN instance is updated.
Example
# Configure keepalive detection for RADIUS server based on RADIUS server IP
address.
<HUAWEI> system-view
[HUAWEI] radius-server dead-detect-condition by-server-ip
Format
radius-server { dead-interval dead-interval | dead-count dead-count }
undo radius-server { dead-interval | dead-count }
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
After the system starts, the RADIUS server status detection timer runs. The device
sets the RADIUS server status to Up. When the device sends a RADIUS request
packet to the RADIUS server, if the conditions for setting the RADIUS server status
to Down are met, the device sets the RADIUS server status to Down; if the
conditions are not met, the RADIUS server status remains to be Up.
If multiple RADIUS servers are configured, some servers are Up and the other
servers are Down, and the device receives an authentication request packet from a
user, the device retransmits the packet to a RADIUS server in Up status based on
the server priority and detects the actual status of the server. The following
describes the process in which a device detects the status of a RADIUS server.
1. If the device receives no response packet from the RADIUS server and the
number of times that the device receives no response packet after sending an
authentication request packet is greater than or equal to the maximum
number of consecutive unacknowledged packets within the detection interval,
the device records a communication interruption.
2. If the device records two consecutive communication interruptions with one
RADIUS server, the device considers that the RADIUS server is unavailable and
the condition for the device to set the status of the RADIUS server to Down is
met.
NOTE
If the first connection attempt fails but the second one succeeds, the device deletes the
recorded communication interruption with the RADIUS server.
3. When sending an authentication request packet to the RADIUS server again,
the device sets the server status to Down. If a response packet is received
from the server, the device restores the server status to Up. If no response
packet is received from the server and the number of retransmission times is
not reached, the device sends an authentication request packet to the server
again. If the server still does not respond, the device no longer sends any
authentication request packet to the server.
If the device sets the status of all servers that are originally set to Up to Down
after the device completes the server status detection based on the preceding
detection process or these servers do not respond to the authentication request
packets sent from the device, the device sends an authentication request packet to
a RADIUS server that is originally set to be Down based on the server priority to
detect the server status. (In the original mechanism, the device does not send
authentication request packets to the RADIUS servers that are originally set to be
Down.)
Precautions
● If the device has reported a RADIUS server Up alarm and needs to report a
RADIUS server Down alarm, the device will send the Down alarm 10 seconds
after the Up alarm is sent, even if the RADIUS server Down detection interval
is shorter than 10 seconds (for example, the value of dead-interval is set to 4
seconds, and the RADIUS server Down detection interval is 8 seconds). This
function prevents frequent alarm sending.
● To rapidly detect whether the RADIUS server goes Down, when there are a
small number of users, smaller values are recommended for the detection
interval and maximum number.
● If a user terminal is authenticated using a client and more than one server is
deployed on the live network, the authentication request packet is
retransmitted by each server upon timeout. If a server is faulty, the timeout
wait period of the client software is smaller than the total timeout period of
the servers, and the client repeatedly redials and cannot access the network.
In addition, if the RADIUS server escape function is configured, the total
timeout period of the servers is required to be smaller than the timeout
period of the client software, ensuring that the escape rights can be properly
configured for the user.
Therefore, run the 13.2.41 radius-server retransmit timeout dead-time and
13.2.33 radius-server dead-interval dead-count commands to ensure that
users can properly access the network or are configured with proper escape
rights. For example, the response timeout period of the RADIUS server is
within 4 seconds and the timeout period of the 802.1X client is more than 18
seconds. The recommended configurations in the active/standby mode are as
follows:
– When a server is configured:
Example
# Set the RADIUS server detection interval to 10 seconds and maximum number
of consecutive unacknowledged packets in each detection interval to 2.
<HUAWEI> system-view
[HUAWEI] radius-server dead-interval 10
[HUAWEI] radius-server dead-count 2
Format
radius-server detect-server interval interval
Parameters
Parameter Description Value
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
After the automatic detection function is enabled using the radius-server testuser
command, you can run the radius-server detect-server interval command to
adjust the automatic detection interval for RADIUS servers.
Example
# Set the automatic detection interval for RADIUS servers to 100 seconds in the
RADIUS server template acs.
<HUAWEI> system-view
[HUAWEI] radius-server template acs
[HUAWEI-radius-acs] radius-server detect-server interval 100
Format
radius-server format-attribute nas-port nas-port-sting
undo radius-server format-attribute nas-port
Parameters
Parameter Description Value
is filled by 0s or 1s.
That is, n and z can
be followed by
numbers or o/i in this
case, and the
numbers must range
from 1 to 32.
● To specify the format
string, determine the
interface type, and
then determine the
encapsulation type of
the interface. If the
format string does
not contain o or i, the
NAS-Port attribute
does not contain the
QinQ VLAN or user
VLAN field. If the
format string contains
o or i but no outer
VLAN exists, the outer
VLAN field is filled by
0s. If n is added
before o or i, this field
is filled by 1s when no
outer VLAN or inner
VLAN exists.
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
The NAS port format affects the information about the physical port. The NAS
port format can be used by the RADIUS server to process services, such as binding
the user name and port. This attribute is developed by Huawei, which is used to
ensure connectivity and service cooperation among Huawei devices.
If the radius-server nas-port-format command sets the format of the NAS-Port
attribute to new (the default format is new), the device will check whether the
radius-server format-attribute nas-port command configuration exists. If yes,
the device will assemble the NAS-Port attribute in the format configured by the
radius-server format-attribute nas-port command. If no, the device will
assemble the NAS-Port attribute in the new format. If the radius-server nas-port-
format command sets the format of the NAS-Port attribute to old, the device will
assemble the NAS-Port attribute in the old format, regardless of whether the
radius-server format-attribute nas-port command configuration exists.
Example
# Configure the format of the NAS-Port attribute to s2t2p6no10ni12. That is, the
NAS-Port attribute consists of a 2-bit slot field, a 2-bit subslot field, a 6-bit port
field, a 10-bit outer VLAN field, and a 12-bit inner VLAN field. If the outer VLAN
does not exist, this field is filled by ten 1s. If the inner VLAN does not exist, this
field is filled by twelve 1s. Therefore, the NAS-port attribute contains 32 bits.
<HUAWEI> system-view
[HUAWEI] radius-server template template1
[HUAWEI-radius-template1] radius-server format-attribute nas-port s2t2p6no10ni12
Related Topics
13.2.39 radius-server nas-port-format
NOTE
Format
radius-server hw-ap-info-format include-ap-ip
undo radius-server hw-ap-info-format
Parameters
None
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
RADIUS is a fully extensible protocol. Device vendors can expand the No. 26
attribute defined in the protocol to implement functions not supported by
standard RADIUS attributes. Huawei defines the No. 141 sub-attribute (HW-AP-
Information) in the No. 26 attribute to indicate AP information, including the MAC
and IP addresses of an AP. The HW-AP-Information attribute is carried in the
authentication or accounting request packet send by a device, so that the RADIUS
server can use the AP's MAC and IP addresses as the filter criterion to select a
policy template to be delivered.
Example
#Configure the AP's IP address in Huawei extended attribute HW-AP-Information.
<HUAWEI> system-view
[HUAWEI] radius-server template huawei
[HUAWEI-radius-huawei] radius-server hw-ap-info-format include-ap-ip
Function
The radius-server hw-dhcp-option-format command sets the format of the
Huawei extended attribute HW-DHCP-Option.
Format
radius-server hw-dhcp-option-format { new | old }
Parameters
Parameter Description Value
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
The RADIUS protocol has good extensibility. Device vendors can expand the No. 26
RADIUS attribute to implement new functions. Huawei defines that the No.158
sub-attribute in the No.26 attribute represents DHCP option and is encapsulated
through Type, Length, Value (TLV). The device adds this attribute in authentication
request or accounting request packets and sends the DHCP option information to
the RADIUS server.
To connect to different types of RADIUS server, the device supports two HW-
DHCP-Option formats: new and old.
● new: When the attribute is encapsulated through TLV, the Type field length is
1 byte. This format is applicable when the device connects to most types of
RADIUS servers.
● old: When the attribute is encapsulated through TLV, the Type field length is 2
bytes. This format is applicable when the device connects to special RADIUS
servers, for example, Huawei RADIUS server.
Example
# Set the format of Huawei extended attribute HW-DHCP-Option to new.
<HUAWEI> system-view
[HUAWEI] radius-server template huawei
[HUAWEI-radius-huawei] radius-server hw-dhcp-option-format new
Function
The radius-server nas-identifier-format command sets the encapsulation format
of the NAS-Identifier attribute.
Format
radius-server nas-identifier-format { hostname | vlan-id }
Parameters
Parameter Description Value
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
A RADIUS server uses the NAS-Identifier attributes to identify NASs. The NASs also
use the NAS-Identifier attributes carried in the sent RADIUS packets to identify
themselves.
Example
# Set the NAS-Identifier encapsulation format to VLAN ID.
<HUAWEI> system-view
[HUAWEI] radius-server template template1
[HUAWEI-radius-template1] radius-server nas-identifier-format vlan-id
Function
The radius-server nas-port-format command sets the format of the NAS port
attribute.
Format
radius-server nas-port-format { new | old }
Parameters
Parameter Description Value
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The NAS port format affects the information about the physical port. The NAS
port format can be used by the RADIUS server to process services, such as binding
the user name and port. This attribute is developed by Huawei, which is used to
ensure connectivity and service cooperation among Huawei devices.
Precautions
The difference between the two NAS port formats lies in the physical ports
connected to Ethernet access users.
● The new format of the NAS port attribute is slot number (8 bits) + subslot
number (4 bits) + port number (8 bits) + VLAN ID (12 bits).
● The old format of the NAS port attribute is slot number (12 bits) + port
number (8 bits) + VLAN ID (12 bits).
The format of the NAS port attribute for Asymmetric Digital Subscriber Line
(ADSL) access users is slot number (4 bits) + subslot number (2 bits) + port
number (2 bits) + VPI (8 bits) + VCI (16 bits). This format is not affected by the
command.
Example
# Set the format of the NAS port attribute to new.
<HUAWEI> system-view
[HUAWEI] radius-server template template1
[HUAWEI-radius-template1] radius-server nas-port-format new
Function
The radius-server nas-port-id-format command sets the format of the NAS port
ID attribute.
Format
radius-server nas-port-id-format { new | old | vm }
Parameters
Parameter Description Value
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The NAS port format and the NAS port ID format are developed by Huawei, which
are used to ensure connectivity and service cooperation among Huawei devices.
Precautions
Example
# Set the format of the NAS port ID attribute to new.
<HUAWEI> system-view
[HUAWEI] radius-server template template1
[HUAWEI-radius-template1] radius-server nas-port-id-format new
Related Topics
13.2.10 display radius-server configuration
Function
The radius-server retransmit timeout dead-time command sets the number of
times that RADIUS request packets are retransmitted, timeout period, and interval
for the server to revert to the active status.
Format
radius-server { retransmit retry-times | timeout time-value | dead-time dead-
time } *
Parameters
Parameter Description Value
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The retransmission upon timeout mechanism is configured for a device to forward
RADIUS Access-Request packets sourced from users to the server. The overall
retransmission time depends on the retransmission interval, retransmission times,
RADIUS server status, and number of servers configured in the RADIUS server
template.
You can configure the number of times that RADIUS request packets are
retransmitted and the timeout period using the radius-server retransmit retry-
times and radius-server timeout time-value commands, respectively. If a device
sends an authentication request packet to the RADIUS server and does not receive
any response packet from the server during the timeout period, the device sends
an authentication request packet again.
You can run the radius-server dead-time dead-time command to configure the
duration for which the RADIUS server status remains Down. After the device sets
the RADIUS server status to Down and the interval specified by dead-time expires,
the device resets the server status to Force-up. If a new user needs to be
authenticated in RADIUS mode and no RADIUS server is available, the device
attempts to re-establish a connection with a RADIUS server in Force-up status. The
Force-up status is defined to prevent servers in Down status from remaining idle.
NOTE
If automatic detection for RADIUS servers is configured using the radius-server testuser
command, the server status is maintained using the automatic detection function. The interval
for the RADIUS server to revert to the active status configured using the radius-server
retransmit timeout dead-time command does not take effect.
Precautions
Example
# Set the number of retransmission times to 3, the timeout period to 2s, and the
interval for the server to revert to the active status to 10 minutes.
<HUAWEI> system-view
[HUAWEI] radius-server template test1
[HUAWEI-radius-test1] radius-server retransmit 3 timeout 2 dead-time 10
Related Topics
13.2.10 display radius-server configuration
13.2.45 radius-server template
Function
The radius-server session-manage command enables session management on
the RADIUS server.
Format
radius-server session-manage { ip-address [ vpn-instance vpn-instance-name ]
shared-key cipher share-key | any }
NOTE
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To improve device security, run this command to enable session management on
the RADIUS server. After this function is enabled, the device checks the source IP
addresses and shared keys for the received session management packets. When
the source IP addresses and shared keys match the configured values, the packets
are processed; otherwise, the packets are discarded.
Precautions
Example
# Enable session management on the RADIUS server, and set the IP address and
shared key of the RADIUS session management server to 10.1.1.1 and
Huawei@2012 respectively.
<HUAWEI> system-view
[HUAWEI] radius-server session-manage 10.1.1.1 shared-key cipher Huawei@2012
Related Topics
13.2.13 display radius-server session-manage configuration
Function
The radius-server shared-key command configures the shared key of a RADIUS
server.
The default username and password are available in S Series Switches Default
Usernames and Passwords (Enterprise Network or Carrier). If you have not
obtained the access permission of the document, see Help on the website to find
out how to obtain it.
Format
radius-server shared-key cipher key-string
Parameters
Parameter Description Value
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The shared key is used to encrypt the password and generate the response
authenticator.
When exchanging authentication packets with a RADIUS server, the device uses
MD5 to encrypt important data such as the password to ensure security of data
transmission over the network. To ensure validity of both communication parties,
the device and RADIUS server must be configured with the same shared key.
Example
# Set the shared key of a RADIUS server to Huawei@2012 in cipher text.
<HUAWEI> system-view
[HUAWEI] radius-server template template1
[HUAWEI-radius-template1] radius-server shared-key cipher Huawei@2012
Related Topics
13.2.10 display radius-server configuration
13.2.45 radius-server template
Format
radius-server ip-address { ipv4-address | ipv6-address } shared-key cipher key-
string
undo radius-server ip-address { ipv4-address | ipv6-address } shared-key
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The shared key is used to encrypt the password and generate the response
authenticator.
When exchanging authentication packets with a RADIUS server, the device uses
MD5 to encrypt important data such as the password to ensure security of data
Example
# Set the shared key for RADIUS server to Huawei@2012.
<HUAWEI> system-view
[HUAWEI] radius-server ip-address 10.1.1.1 shared-key cipher Huawei@2012
Related Topics
13.2.43 radius-server shared-key (RADIUS server template view)
Format
radius-server template template-name
undo radius-server template template-name
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Follow-up Procedure
Example
# Create a RADIUS server template template1 and enter the RADIUS server
template view.
<HUAWEI> system-view
[HUAWEI] radius-server template template1
[HUAWEI-radius-template1]
Related Topics
13.2.10 display radius-server configuration
13.2.22 radius-server (aaa domain view)
Format
radius-server testuser username user-name password cipher password
undo radius-server testuser
Parameters
Parameter Description Value
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
After the RADIUS server status is set to Down, you can configure the automatic
detection function to test the RADIUS server reachability.
After automatic detection is configured for users, the device periodically performs
automatic detection on the RADIUS server in Down status. You can set the
automatic detection interval using the radius-server detect-server command.
For the automatic status detection function, only the automatic detection user
name and password need to be configured in the RADIUS server template on the
device, and the automatic detection account does not need to be configured on
the RADIUS server. Authentication success is not mandatory. If the device can
receive the authentication failure response packet, the RADIUS server is properly
working and the device sets the RADIUS server status to Up. If the device cannot
receive the response packet, the RADIUS server is unavailable and the device sets
the RADIUS server status to Down.
Example
# Create a user account with the user name test and password Huawei@2012 in
RADIUS server template acs.
<HUAWEI> system-view
[HUAWEI] radius-server template acs
[HUAWEI-radius-acs] radius-server testuser username test password cipher Huawei@2012
Format
radius-server traffic-unit { byte | kbyte | mbyte | gbyte }
undo radius-server traffic-unit
Parameters
Parameter Description Value
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
Different RADIUS servers may use different traffic units; therefore, you need to set
the traffic unit for each RADIUS server group on the router and the traffic unit
must be the same as that on the RADIUS server.
Example
# Set the traffic unit used by a RADIUS server to kilobyte.
<HUAWEI> system-view
[HUAWEI] radius-server template template1
[HUAWEI-radius-template1] radius-server traffic-unit kbyte
Related Topics
13.2.10 display radius-server configuration
Format
radius-server user-name domain-included
radius-server user-name original
undo radius-server user-name domain-included
Parameters
None
Views
RADIUS server template view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The format of a user name is user name@domain name. In the user name, @ is
the domain name delimiter. The domain name delimiter can also be any of the
following symbols: \ / : < > | ' %.
If the RADIUS server does not accept the user name with the domain name, run
the undo radius-server user-name domain-included command to delete the
domain name from the user name.
Precautions
If the user names in the RADIUS packets sent from the device to RADIUS server
contain domain names, ensure that the total length of a user name (user name +
domain name delimiter + domain name) is not longer than 253 characters;
otherwise, the user name cannot be contained in RADIUS packets. As a result,
authentication will fail.
Example
# Configure the device not to encapsulate the domain name in the user name
when sending RADIUS packets to a RADIUS server.
<HUAWEI> system-view
[HUAWEI] radius-server template template1
[HUAWEI-radius-template1] undo radius-server user-name domain-included
Related Topics
13.2.10 display radius-server configuration
Function
The reset radius-server accounting-stop-packet command clears statistics on
the remaining buffer information of RADIUS accounting-stop packets.
Format
reset radius-server accounting-stop-packet { all | ip { ipv4-address | ipv6-
address } }
Parameters
Parameter Description Value
Views
User view
Default Level
3: Management level
Usage Guidelines
This command can clear statistics on the remaining buffer information of RADIUS
accounting-stop packets. The deleted statistics cannot be restored.
Example
# Clear statistics on the remaining buffer information of all RADIUS accounting-
stop packets.
<HUAWEI> reset radius-server accounting-stop-packet all
Related Topics
13.2.8 display radius-server accounting-stop-packet
Function
The snmp-agent trap enable feature-name radius command enables the trap
function for the RDS module.
The undo snmp-agent trap enable feature-name radius command disables the
trap function for the RDS module.
Format
snmp-agent trap enable feature-name radius [ trap-name
{ hwradiusacctserverdown | hwradiusacctserverup | hwradiusauthserverdown |
hwradiusauthserverup } ]
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
After the trap function is enabled, the device generates traps during operation and
sends the traps to the NMS through the SNMP module. If the trap function is
disabled, the device does not generate traps and the SNMP module does not send
traps to the NMS.
You can specify trap-name to enable the trap function for one or more events.
Example
# Enable the trap function for hwradiusacctserverdown of the RDS module.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name radius trap-name hwradiusacctserverdown
Related Topics
13.2.14 display snmp-agent trap feature-name radius all
13.2.51 test-aaa
Function
The test-aaa command tests the connectivity between the device and the
authentication server or accounting server, and tests whether a user can be
authenticated using authentication server and whether the accounting server can
charge a user.
Format
test-aaa user-name user-password radius-template template-name [ chap | pap
| accounting [ start | realtime | stop ] ]
Parameters
Parameter Description Value
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The test-aaa command tests service reachability of the server. The device sends an
authentication or accounting request packet to the server. If the server returns an
authentication or accounting success packet, the device and server can
communicate with each other. If the server's response times out, the device and
server cannot communicate with each other.
Prerequisites
An authentication server template or accounting server template has been
created, an authentication server or accounting server has been specified in the
authentication server template or accounting server template, and the
authentication server or accounting server has been configured.
Follow-up Procedure
If the test result indicates that the user fails to be authenticated by using
authentication server or the accounting server fails to charge the user, check
whether the configuration of the authentication server template and the
authentication server is correct, and check the connectivity between the device
and the authentication server.
Precautions
chap and pap are two authentication modes.
● PAP: The NAS device adds the user name and encrypted password to the
corresponding fields of authentication request packets, and then sends the
packets to the RADIUS server. The NAS device determines whether to allow
the user go online based on the result returned by the RADIUS server.
● CHAP: The NAS device sends the user name, password, and 16-byte random
code to the RADIUS server. The RADIUS server searches for the database
according to the user name and obtains the password that is the same as the
encrypted password at the user side. The RADIUS server then encrypts the
received 16-byte random code and compares the result with the password. If
they are the same, the user is authenticated. If they are different, the user
fails to be authenticated. In addition, if the user is authenticated, the RADIUS
server generates a 16-byte random code to challenge the user.
Before running the test-aaa command, you only need to create a RADIUS server
template and specify an authentication server or accounting server in the RADIUS
server template.
Example
# Test whether the user user1 can be authenticated using CHAP authentication in
the RADIUS server template huawei.
<HUAWEI> test-aaa user1 userkey radius-template huawei chap
Info: The server template does not exist.
Format
display hwtacacs-server accounting-stop-packet { all | number | ip ip-address }
Parameters
Parameter Description Value
Views
All views
Default Level
3: Management level
Usage Guidelines
During HWTACACS troubleshooting, you can run this command to check
information about Accounting-Stop packets sent by the HWTACACS server.
Example
# Display information about all Accounting-Stop packets.
<HUAWEI> display hwtacacs-server accounting-stop-packet all
-------------------------------------------------------------
NO. SendTime IP Address Template
1 10 192.168.1.110 tac
-------------------------------------------------------------
Whole accounting stop packet to resend:1
Item Description
Item Description
Related Topics
13.3.8 hwtacacs-server accounting-stop-packet resend
13.3.19 reset hwtacacs-server accounting-stop-packet
Function
The display hwtacacs-server template command displays the configurations of
an HWTACACS server template.
Format
display hwtacacs-server template [ template-name ]
Parameters
Views
All views
Default Level
3: Management level
Usage Guidelines
The display hwtacacs-server template command output helps you check the
configuration of HWTACACS server templates and isolate faults.
NOTE
The device determines whether its communication with the HWTACACS server is proper based
on the response timeout mechanism of HWTACACS request packets, and always marks the
status of the last HWTACACS server as Up.
Example
# Display the configuration of the HWTACACS server template template0.
<HUAWEI> display hwtacacs-server template template0
---------------------------------------------------------------------------
HWTACACS-server template name : template0
Primary-authentication-server : 10.7.66.66:49:-
Primary-authorization-server : 10.7.66.66:49:-
Primary-accounting-server : 10.7.66.66:49:-
Secondary-authentication-server : 10.7.66.67:49:-
Secondary-authorization-server : 10.7.66.67:49:-
Secondary-accounting-server : 10.7.66.67:49:-
Current-authentication-server : 10.7.66.66:49:-
Current-authorization-server : 10.7.66.66:49:-
Current-accounting-server : 10.7.66.66:49:-
Source-IP-address : 0.0.0.0
Shared-key : ****************
Quiet-interval(min) :5
Response-timeout-Interval(sec) : 5
Domain-included : Yes
Traffic-unit :B
---------------------------------------------------------------------------
Item Description
Format
display hwtacacs-server template template-name verbose
Parameters
Parameter Description Value
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
By viewing statistics on HWTACACS authentication, accounting, and authorization,
administrators can better understand the interaction between modules, facilitating
fault locating and troubleshooting.
You can run the reset hwtacacs-server statistics { all | accounting |
authentication | authorization } command to delete statistics on HWTACACS
authentication, accounting, and authorization.
Precautions
In the HWTACACS server template, you can query the relevant statistics only after
the IP address of the authentication server, the IP address of the authorization
server, or the IP address of the accounting server is configured.
Example
# Display statistics on HWTACACS authentication, accounting, and authorization
in the HWTACACS server template test1.
<HUAWEI> display hwtacacs-server template test1 verbose
---[HWTACACS template test1 primary
authentication]---
HWTACACS server open number:
1670281960
HWTACACS server close number: 508333868
HWTACACS authen client access request packet number:
0
HWTACACS authen client access response packet number:
0
HWTACACS authen client unknown type number:
0
HWTACACS authen client timeout number: 0
HWTACACS authen client packet dropped number:
0
HWTACACS authen client access request change password number:
0
HWTACACS authen client access request login number:
0
Item Description
Item Description
Item Description
Item Description
Function
The hwtacacs enable command enables Huawei Terminal Access Controller
Access Control System (HWTACACS).
Format
hwtacacs enable
hwtacacs disable
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Precautions
Example
# Disable HWTACACS.
<HUAWEI> system-view
[HUAWEI] undo hwtacacs enable
13.3.6 hwtacacs-server
Function
The hwtacacs-server command applies an HWTACACS server template to a
domain.
The undo hwtacacs-server command deletes an HWTACACS server template
from a domain.
By default, no HWTACACS server template is applied to a domain.
Format
hwtacacs-server template-name
undo hwtacacs-server
Parameters
Parameter Description Value
Views
AAA domain view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To perform HWTACACS authentication, authorization, and accounting for users in
a domain, configure an HWTACACS server template in the domain. After the
HWTACACS server template is configured in the domain, the configuration in the
HWTACACS server template takes effect.
Prerequisites
An HWTACACS server template has been created by using the 13.3.13 hwtacacs-
server template command.
Example
# Apply the HWTACACS server template tacacs1 to the domain tacacs1.
<HUAWEI> system-view
[HUAWEI] hwtacacs-server template tacacs1
[HUAWEI-hwtacacs-tacacs1] quit
[HUAWEI] aaa
[HUAWEI-aaa] domain tacacs1
[HUAWEI-aaa-domain-tacacs1] hwtacacs-server tacacs1
Related Topics
13.3.3 display hwtacacs-server template
13.3.13 hwtacacs-server template
Function
The hwtacacs-server accounting command configures an HWTACACS accounting
server.
Format
hwtacacs-server accounting ip-address [ port ] [ public-net | vpn-instance vpn-
instance-name ] [ secondary ]
NOTE
Parameters
Parameter Description Value
Views
HWTACACS server template view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The device does not support local accounting; therefore, you need to configure an
HWTACACS accounting server to perform accounting. The device sends accounting
packets to an HWTACACS accounting server only after the accounting server is
specified in an HWTACACS server template.
Precautions
● You can modify this configuration only when device does not set up TCP
connection with the specified accounting server.
● The IP addresses of the primary and secondary servers must be different.
Otherwise, the server configuration fails.
● If the command is run for multiple times in the same HWTACACS server
template to configure the servers with the same type (for example, the
servers are all primary servers), only the latest configuration takes effect.
Example
# Configure the primary HWTACACS accounting server.
<HUAWEI> system-view
[HUAWEI] hwtacacs-server template test1
[HUAWEI-hwtacacs-test1] hwtacacs-server accounting 10.163.155.12 52
Related Topics
13.3.3 display hwtacacs-server template
Format
hwtacacs-server accounting-stop-packet resend { disable | enable number }
undo hwtacacs-server accounting-stop-packet resend
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Precautions
Example
# Enable the retransmission of accounting-stop packets and set the number of
accounting-stop packets that can be retransmitted each time to 50.
<HUAWEI> system-view
[HUAWEI] hwtacacs-server accounting-stop-packet resend enable 50
Related Topics
13.3.2 display hwtacacs-server accounting-stop-packet
Function
The hwtacacs-server authentication command configures the HWTACACS
authentication server.
Format
hwtacacs-server authentication ip-address [ port ] [ public-net | vpn-instance
vpn-instance-name ] [ secondary ]
NOTE
Parameters
Parameter Description Value
Views
HWTACACS server template view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
● The device fails to send a request packet to the primary authentication server.
● If the device does not receive any authentication response packet from the
primary server:
● The primary authentication server requires re-authentication.
● The primary authentication server considers that the received authentication
request packet is incorrect.
Precautions
● You can modify this configuration only when device does not set up TCP
connection with the specified accounting server.
● The IP addresses of the primary and secondary servers must be different.
Otherwise, the server configuration fails.
● If the command is run for multiple times in the same HWTACACS server
template to configure the servers with the same type (for example, the
servers are all primary servers), only the latest configuration takes effect.
Example
# Configure the primary HWTACACS authentication server.
<HUAWEI> system-view
[HUAWEI] hwtacacs-server template test1
[HUAWEI-hwtacacs-test1] hwtacacs-server authentication 10.163.155.12 49
Related Topics
13.3.3 display hwtacacs-server template
Function
The hwtacacs-server authorization command configures the HWTACACS
authorization server.
Format
hwtacacs-server authorization ip-address [ port ] [ public-net | vpn-instance
vpn-instance-name ] [ secondary ]
undo hwtacacs-server authorization [ ip-address [ port ] [ public-net | vpn-
instance [ vpn-instance-name ] ] ] [ secondary ]
NOTE
Parameters
Parameter Description Value
Views
HWTACACS server template view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Precautions
● You can modify this configuration only when device does not set up TCP
connection with the specified accounting server.
● The IP addresses of the primary and secondary servers must be different.
Otherwise, the server configuration fails.
● If the command is run for multiple times in the same HWTACACS server
template to configure the servers with the same type (for example, the
servers are all primary servers), only the latest configuration takes effect.
Example
# Configure the primary HWTACACS authorization server.
<HUAWEI> system-view
[HUAWEI] hwtacacs-server template test1
[HUAWEI-hwtacacs-test1] hwtacacs-server authorization 10.163.155.12 49
Related Topics
13.3.3 display hwtacacs-server template
Function
The hwtacacs-server shared-key command sets a shared key for an HWTACACS
server.
By default, the HWTACACS server is not configured with any shared key.
Format
hwtacacs-server shared-key [ cipher ] key-string
Parameters
Views
HWTACACS server template view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The shared key is used to encrypt the password and generate the response
authenticator.
Precautions
You can modify this configuration only when the HWTACACS server template is
not in use.
Example
# Set the shared key of the HWTACACS server to Admin@123.
<HUAWEI> system-view
[HUAWEI] hwtacacs-server template test1
[HUAWEI-hwtacacs-test1] hwtacacs-server shared-key cipher Admin@123
Related Topics
13.3.3 display hwtacacs-server template
13.3.13 hwtacacs-server template
Function
The hwtacacs-server source-ip command specifies the source IP address used by
a device to communicate with an HWTACACS server.
By default, the device uses the IP address of the actual outbound interface as the
source IP address encapsulated in HWTACACS packets.
Format
hwtacacs-server source-ip ip-address
Parameters
Parameter Description Value
ip-address Specifies the source IP address for The value is a valid unicast
communication between the device address in dotted decimal
and HWTACACS server. notation.
Views
HWTACACS server template view
Default Level
3: Management level
Usage Guidelines
You can configure all HWTACACS packets sent by the device to use the same
source IP address. In this way, an HWTACACS server uses only one IP address to
communicate with the device.
Example
# Specify the source IP address 10.1.1.1 for communication between the device
and HWTACACS server.
<HUAWEI> system-view
[HUAWEI] hwtacacs-server template test1
[HUAWEI-hwtacacs-test1] hwtacacs-server source-ip 10.1.1.1
Related Topics
13.3.3 display hwtacacs-server template
13.3.13 hwtacacs-server template
Function
The hwtacacs-server template command creates an HWTACACS server template
and enters the HWTACACS server template view.
Format
hwtacacs-server template template-name
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Follow-up Procedure
Precautions
You can modify the content of a template or delete a template only when the
template is not in use.
Example
# Create an HWTACACS server template template1 and enter the HWTACACS
server template view.
<HUAWEI> system-view
[HUAWEI] hwtacacs-server template template1
[HUAWEI-hwtacacs-template1]
Related Topics
13.3.3 display hwtacacs-server template
13.3.6 hwtacacs-server
Format
hwtacacs-server timer quiet interval
undo hwtacacs-server timer quiet
Parameters
Parameter Description Value
Views
HWTACACS server template view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
If the primary server is unavailable, the device automatically switches services to
the standby server and sends packets to the standby server. After the quiet interval
before the primary server reverts to the active state expires, the device attempts to
establish a connection with the primary server.
● If the primary server is still unavailable, the device continues to send packets
to the standby server until the next interval expires. Such a process repeats.
● If the primary server is available, the device switches services to the primary
server and sends packets to the primary server.
The quiet interval before the primary server reverts to the active state ensures that
the primary server can be restored immediately and reduces the number of
detection times during the switchover.
The default value is recommended.
Precautions
When you run the hwtacacs-server timer quiet command to change the quiet
interval before the primary server reverts to the active state, the device does not
check whether the HWTACACS server template is in use.
Example
# Set the quiet interval before the primary server reverts to the active state to 3
minutes.
<HUAWEI> system-view
[HUAWEI] hwtacacs-server template template1
[HUAWEI-hwtacacs-template1] hwtacacs-server timer quiet 3
Related Topics
13.3.3 display hwtacacs-server template
Format
hwtacacs-server timer response-timeout interval
undo hwtacacs-server timer response-timeout
Parameters
Parameter Description Value
Views
HWTACACS server template view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
After the device sends a request packet to the HWTACACS server, if the device
does not receive any response packet from the server within the specified response
timeout interval:
● If only one HWTACACS server is configured, the device retransmits the request
to this server.
● If active/standby HWTACACS servers are configured, the device retransmits
the request to the standby server.
This improves reliability of HWTACACS authentication, authorization, and
accounting.
Precautions
You can modify this configuration only when the HWTACACS server template is
not in use.
Example
# Set the response timeout interval of an HWTACACS server to 30s.
<HUAWEI> system-view
[HUAWEI] hwtacacs-server template test1
[HUAWEI-hwtacacs-test1] hwtacacs-server timer response-timeout 30
Related Topics
13.3.3 display hwtacacs-server template
13.3.13 hwtacacs-server template
Function
The hwtacacs-server traffic-unit command sets the traffic unit used by an
HWTACACS server.
The undo hwtacacs-server traffic-unit command restores the default traffic unit
used by the HWTACACS server.
Format
hwtacacs-server traffic-unit { byte | kbyte | mbyte | gbyte }
undo hwtacacs-server traffic-unit
Parameters
Parameter Description Value
Views
HWTACACS server template view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Different HWTACACS servers may use different traffic units; therefore, you need to
set the traffic unit for each HWTACACS server group on the device and the traffic
unit must be the same as that on the HWTACACS server.
Precautions
You can modify this configuration only when the HWTACACS server template is
not in use.
Example
# Set the traffic unit used by an HWTACACS server to KByte.
<HUAWEI> system-view
[HUAWEI] hwtacacs-server template template1
[HUAWEI-hwtacacs-template1] hwtacacs-server traffic-unit kbyte
Related Topics
13.3.3 display hwtacacs-server template
13.3.13 hwtacacs-server template
Format
hwtacacs-server user-name domain-included
undo hwtacacs-server user-name domain-included
Parameters
None
Views
HWTACACS server template view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The format of a user name is user name@domain name. In the user name, @ is
the domain name delimiter.
If the HWTACACS server does not accept the user name with the domain name,
run the undo hwtacacs-server user-name domain-included command to delete
the domain name from the user name.
Precautions
You can modify this configuration only when the HWTACACS server template is
not in use.
The hwtacacs-server user-name domain-included command in the current
version does not take effect. The user names sent by the device can be either of
the following: 1. By default, the user names in the packets sent from the device to
the HWTACACS server are original, and the device does not modify the user
names. 2. After the undo hwtacacs-server user-name domain-included
command is executed, the user names in the packets sent from the device to the
HWTACACS server do not contain domain names.
If the user names in the HWTACACS packets sent from the device to HWTACACS
server contain domain names, ensure that the total length of a user name (user
name + domain name delimiter + domain name) is not longer than 64 characters;
otherwise, the user name cannot be contained in HWTACACS packets. As a result,
authentication will fail.
Example
# Configure the device to encapsulate the domain name in the user name when
sending HWTACACS packets to an HWTACACS server.
<HUAWEI> system-view
[HUAWEI] hwtacacs-server template template1
[HUAWEI-hwtacacs-template1] hwtacacs-server user-name domain-included
Related Topics
13.3.3 display hwtacacs-server template
Format
hwtacacs-user change-password hwtacacs-server template-name
Parameters
Parameter Description Value
Views
User view
Default Level
0: Visit level
Usage Guidelines
Usage Scenario
To change the password saved on the HWTACACS server, users can run the
hwtacacs-user change-password hwtacacs-server command on the device. You
do not need to change the configuration on the HWTACACS server.
Precautions
● Users are HWTACACS authenticated and the HWTACACS server template is
configured.
● Users can run this command to change the passwords only when the user
names and passwords saved on the HWTACACS do not expire. When a user
whose password has expired logs in to the device, the HWTACACS server does
not allow the user to change the password and displays a message indicating
that the authentication fails.
● The system wait period is 30 seconds. If the TACACS server does not receive
the user name, new password, or confirmed password from the user within
such a period, it terminates the password change process.
● Users can also press Ctrl+C to cancel password change.
● HWTACACS users who pass AAA authentication can use the hwtacacs-user
change-password hwtacacs-server command to change the passwords
before the passwords expire. If a user needs to run this command to change
the passwords of other users, the user must have the system rights.
Example
# Enable the user that passes HWTACACS authentication to change the password.
<HUAWEI> hwtacacs-user change-password hwtacacs-server huawei
Username:cj@huawei
Old Password:
New Password:
Re-enter New password:
Info: The password has been changed successfully.
Function
The reset hwtacacs-server accounting-stop-packet command clears statistics on
Accounting Stop packets.
Format
reset hwtacacs-server accounting-stop-packet { all | ip ip-address }
Parameters
Parameter Description Value
Views
User view
Default Level
3: Management level
Usage Guidelines
Statistics cannot be restored once being cleared.
Example
# Clear statistics on all Accounting Stop packets.
<HUAWEI> reset hwtacacs-server accounting-stop-packet all
Related Topics
13.3.2 display hwtacacs-server accounting-stop-packet
Format
reset hwtacacs-server statistics { all | accounting | authentication |
authorization }
Parameters
Parameter Description Value
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
If statistics about HWTACACS authentication, accounting, and authorization need
to be collected in a specified period of time, you must clear the original statistics
first.
Precautions
● After the reset hwtacacs-server statistics command is run, all the statistics
about HWTACACS authentication, accounting, and authorization is cleared. In
addition, the statistics cannot be restored once being cleared. Therefore,
exercise caution when you decide to run this command.
● You can run the display hwtacacs-server template template-name verbose
command to check statistics about HWTACACS authentication, accounting,
and authorization in the specified server template.
Example
# Clear all the statistics.
<HUAWEI> reset hwtacacs-server statistics all
Related Topics
13.3.3 display hwtacacs-server template
Format
access-context profile enable
undo access-context profile enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
User context refers to association information of a user, such as the user name,
user VLAN, and access interface.
To simplify the authentication server configuration, the administrator can add the
users with the same network access rights to the same user context profile based
on the user context, and configure the network access rights for the users based
on the user context profile. When a user goes online after the user context
identification function is enabled, the device can identify the user context
information and add the user to the corresponding context profile based on the
identification result.
● If the user is authenticated successfully, the authentication server can assign
the network access rights mapping the user context profile to the user based
on the user context reported by the device.
● If the user fails to be authenticated, the device assigns the user the network
access rights in each phase before authentication success, which are bound to
the context profile in the user authentication event authorization policy.
For example, on some enterprise networks, VLANs are used to divide the entire
network into different areas with various security levels. The administrator
requires that a user should obtain different network access rights when the user
connects to the network from different areas. In this case, the user context
identification function can be enabled on access devices, and a group of VLANs
that belong to the same area are added to the same user context profile. The
administrator then assigns the mapping network access rights to different user
context profiles based on the security level of each area. When a user connects to
the network from different areas, the user is added to different user context
profiles matching their access VLANs and therefore obtains different network
access rights.
Follow-up Procedure
Precautions
Example
# Enable the user context identification function.
<HUAWEI> system-view
[HUAWEI] access-context profile enable
Function
The access-context profile name command creates a user context profile and
displays the user context profile view.
The undo access-context profile name command deletes the created user
context profile.
Format
access-context profile name profile-name
undo access-context profile name profile-name
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To simplify the authentication server configuration, the administrator can add the
users with the same network access rights to the same user context profile based
on the user context, and assign the network access rights to the users based on
the user context profile.
Follow-up Procedure
In the user context profile view, run the if-match vlan-id start-vlan-id [ to end-
vlan-id ] &<1-10> command to configure the user identification policy based on
VLAN IDs.
Example
# Creates the user context profile p1.
<HUAWEI> system-view
[HUAWEI] access-context profile name p1
Format
access-author policy policy-name global
undo access-author policy policy-name global
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Users need basic network access rights before they are authenticated. For
example, the users need to download 802.1X clients and update the antivirus
database. A user authentication event authorization policy can be used to bind the
network access rights of users in each phase before authentication success to a
user context profile. When a user goes online after a user authentication event
authorization policy is applied to the device, the device adds the user to the
context profile based on the user context identification result, and assigns the
network access rights to the user based on the user authentication result.
Prerequisites
A user authentication event authorization policy has been created using the
access-author policy name policy-name command in the system view.
Precautions
This function takes effect only for users who go online after this function is
successfully configured.
Example
# Globally apply the user authentication event authorization policy a1.
<HUAWEI> system-view
[HUAWEI] access-author policy name a1
[HUAWEI-access-author-a1] quit
[HUAWEI] access-author policy a1 global
Format
access-author policy name policy-name
undo access-author policy name policy-name
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Users need basic network access rights before they are authenticated. For
example, the users need to download 802.1X clients and update the antivirus
database. A user authentication event authorization policy can be used to bind the
network access rights of users in each phase before authentication success to a
user context profile. When a user goes online after a user authentication event
authorization policy is applied to the device, the device adds the user to the
context profile based on the user context identification result, and assigns the
network access rights to the user based on the user authentication result.
Follow-up Procedure
1. In the user authentication event authorization policy view, run the match
access-context-profile action command to configure the network access
rights for users in each phase before authentication success.
2. In the system view, run the access-author policy global command to apply
the user authentication event authorization policy.
Example
# Create the user authentication event authorization policy a1.
<HUAWEI> system-view
[HUAWEI] access-author policy name a1
13.4.6 access-domain
Function
The access-domain command configures a default or forcible domain in an
authentication profile for users.
The undo access-domain command deletes a configured default or forcible
domain in an authentication profile.
By default, no default or forcible domain is configured in an authentication profile.
Format
access-domain domain-name [ dot1x | mac-authen | portal ] * [ force ]
Parameters
Parameter Description Value
Views
Authentication profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The device manages users in domains. For example, AAA schemes and
authorization information are bound to domains. During user authentication, the
device assigns users to specified domains based on the domain names contained
in user names. However, user names entered by many users on actual networks do
not contain domain names. In this case, you can configure a default domain in an
authentication profile. If users using this profile enter user names that do not
contain domain names, the device manages the users in the default domain.
On actual networks, user names entered by some users contain domain names
and those entered by other users do not. The device uses different domains to
manage the users. Because authentication, authorization and accounting (AAA)
information in the domains are different, users use different AAA information. To
ensure that users using the same authentication profile use the same AAA
information, you can configure a forcible domain in the authentication profile for
the users. The device then manages the users in the forcible domain regardless of
whether entered user names contain domain names or not.
Prerequisites
A domain has been configured using the 13.1.47 domain (AAA view) command
in the AAA view.
Precautions
● If both a default domain and a forcible domain are configured, the device
authenticates users in the forcible domain.
● This function takes effect only for users who go online after this function is
successfully configured.
● In a wireless scenario, RADIUS accounting is performed only for AAA users
who do not need to pass authentication in a forcible domain, and cannot be
performed for such users in the default domain.
Example
# Configure the forcible domain huawei in the authentication profile p1.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] domain huawei
[HUAWEI-aaa-domain-huawei] quit
[HUAWEI-aaa] quit
[HUAWEI] authentication-profile name p1
[HUAWEI-authen-profile-p1] access-domain huawei force
Related Topics
13.4.61 display authentication-profile configuration
Function
The access-user arp-detect command sets the source IP address and source MAC
address of offline detection packets in a VLAN.
The undo access-user arp-detect command deletes the source IP address and
source MAC address of offline detection packets in a VLAN.
By default, the source IP address and source MAC address are not specified for
offline detection packets in a VLAN.
Format
access-user arp-detect vlan vlan-id ip-address ip-address mac-address mac-
address
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The device sends an ARP probe packet to check the user online status. If the user
does not respond within a detection period, the device considers that the user is
offline.
If the VLAN to which the user belongs does not have a VLANIF interface or the
VLANIF interface does not have an IP address, the device sends an offline
detection packet using 0.0.0.0 as the source IP address. If a user cannot respond to
an ARP probe packet with the source IP address 0.0.0.0, you can specify a source IP
address for the offline detection packet.
You are advised to specify the user gateway IP address and its corresponding MAC
address as the source IP address and source MAC address of offline detection
packets.
Precautions
This function does not take effect for users who use Layer 3 Portal authentication.
If a user on a physical interface is online, this command takes effect only after the
user goes online again or the device re-authenticates the user.
Example
# Set the source IP address and MAC address of offline detection packets for users
in VLAN 10 to 192.168.1.1 and 2222-1111-1234 respectively.
<HUAWEI> system-view
[HUAWEI] access-user arp-detect vlan 10 ip-address 192.168.1.1 mac-address 2222-1111-1234
Format
access-user arp-detect default ip-address ip-address
undo access-user arp-detect default ip-address
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The device sends an ARP probe packet to check the user online status. If the user
does not respond within a detection period, the device considers that the user is
offline.
Precautions
● This function does not take effect for users who use Layer 3 Portal
authentication.
● In the SVF or policy association scenario, you are advised to run the access-
user arp-detect default ip-address command to set the source IP address of
offline detection packets to 0.0.0.0. In the SVF scenario, the command must
be configured on the UC device and takes effect only for UC detection. The
default source IP address of offline detection packets for AS detection is
0.0.0.0. In the policy association scenario, you can directly configure the
command on the AS device.
● In normal situations, after a device sends an ARP probe packet with a default
source IP address, online clients will immediately respond with ARP reply
packets. If online clients do not respond with ARP reply packets, the device
logs them out unexpectedly. To resolve this problem, use either of the
following methods:
– Run the access-user arp-detect vlan vlan-id ip-address ip-address mac-
address mac-address command to specify a VLAN ID, source IP address,
and source MAC address for ARP probe packets.
– Run the authentication timer handshake-period handshake-period
command to increase the handshake period so that the device can detect
gratuitous ARP packets that these clients send at an irregular period.
Once the device detects such packets, it does not log them out.
Example
# Set the default source IP address of offline detection packets to 0.0.0.0.
<HUAWEI> system-view
[HUAWEI] access-user arp-detect default ip-address 0.0.0.0
NOTE
Format
access-user dot1x-identity speed-limit value
undo access-user dot1x-identity speed-limit [ value ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
If a large number of Identity packets for wireless 802.1X authentication are sent to
the CPU of a switch, the CPU usage is high and other services are affected. To
prevent this problem, run the access-user dot1x-identity speed-limit command
to configure the rate limit of Identity packets for wireless 802.1X authentication to
be sent to the CPU, so that the switch discards excess Identity packets.
Example
# Set the rate limit of Identity packets for wireless 802.1X authentication to be
sent to the CPU to 10 pps.
<HUAWEI> system-view
[HUAWEI] access-user dot1x-identity speed-limit 10
Function
The access-user syslog-restrain enable command enables system log
suppression.
Format
access-user syslog-restrain enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When a user fails in authentication or goes offline, the device records a system
log. The system log contains the MAC addresses of access device and access user
and the authentication time.
If a user repeatedly attempts to go online after authentication failures or
frequently goes online and offline in a short period, a lot of system logs are
generated, which waste system resources and degrade system performance.
System log suppression can address this problem. After the device generates a
system log, it will not generate the same log within the suppression period (set by
13.4.11 access-user syslog-restrain period).
NOTE
The same system logs refer to the system logs containing the same MAC addresses. For
example, after the device generates a system log for a user failing in authentication, the
device will not generate new system log for this user in the suppression period if the user
fails in authentication again. The system logs for users logging offline are generated in the
same way. If a system log has no MAC address, such system logs are suppressed based on
the user name.
Example
# Enable system log suppression.
<HUAWEI> system-view
[HUAWEI] access-user syslog-restrain enable
Related Topics
13.4.11 access-user syslog-restrain period
Format
access-user syslog-restrain period period
undo access-user syslog-restrain period
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After the system log suppression function is enabled using the 13.4.10 access-user
syslog-restrain enable command, use this command to set the system log
suppression period. After generating a system log, the device will not generate the
same log within the suppression period.
Example
# Set the period for system log suppression to 600s.
<HUAWEI> system-view
[HUAWEI] access-user syslog-restrain period 600
Related Topics
13.4.10 access-user syslog-restrain enable
NOTE
Format
acl-id acl-number
undo acl-id { acl-number | all }
Parameters
Parameter Description Value
acl-number The value is an integer
Specifies the number of an ACL bound to
that ranges from 3000
a service scheme.
to 3999.
all Deletes the numbers of all ACLs bound to -
a service scheme.
Views
Service scheme view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
After creating a service scheme using the 13.1.82 service-scheme (AAA view)
command, you can run the acl-id command to bind an ACL to the service scheme.
The user assigned with the service scheme will have the ACL rules.
Prerequisites
An IPv4 ACL must have been created using the 14.1.5 acl (system view) or 14.1.4
acl name command.
Precautions
If all users in a group are required to have the same access rights, do not specify
the source IP address in the ACL bound to the service scheme. If an ACL bound to
a service scheme has defined the source IP address, only users with the same IP
address as the source IP address in the ACL can match the ACL in the service
scheme.
The maximum number of ACLs that can be bound to a service scheme is 4.
In the policy association scenario, if multiple ACLs are configured using this
command on the authentication control device, only the first configured one takes
effect on the authentication access device.
Example
# Bind ACL 3001 to the service scheme huawei.
<HUAWEI> system-view
[HUAWEI] acl 3001
[HUAWEI-acl-adv-3001] quit
[HUAWEI] aaa
[HUAWEI-aaa] service-scheme huawei
[HUAWEI-aaa-service-huawei] acl-id 3001
Format
authentication handshake
undo authentication handshake
Parameters
None
Views
Authentication profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The device creates entries for pre-connection users, users who fail to be
authenticated and are assigned network access rights, and users who are
authenticated. After users go offline in normal situations, the system immediately
deletes the corresponding user entries. However, if some users go offline due to
exceptions such as network disconnections, the system cannot immediately delete
the corresponding user entries. If there are too many such invalid user entries,
other users may fail to access the network.
To solve this problem, run the authentication handshake command to enable the
handshake with pre-connection users and authorized users. If a user does not
respond to the handshake request from the device within the handshake interval,
the device deletes the user entry.
Precautions
● The handshake interval for MAC address authentication users, Layer 3 Portal
authentication users, and 802.1X authentication users is configured using the
13.4.30 authentication timer handshake-period command. The handshake
interval for Layer 2 Portal authentication users is configured using the portal
timer offline-detect command.
● For Layer 3 Portal authentication users, only those who go online through
S5720HI support this function.
● This function takes effect only for the wired users who obtain IP addresses.
● When the configuration changes, the configuration takes effect only for new
online wired users.
● The handshake function is implemented using ARP probe packets or neighbor
discovery (ND) probe packets.
● The handshake function can also be implemented by detecting whether there
is user traffic on the access device. Assuming that the handshake interval is
3n, the device will detect user traffic at n and 2n. The following uses the 0-n
period as an example. The process during the n-2n period is similar to that
during 0-n. (This process applies only to authentication users who go online
from the S5720EI, S5720HI, S6720EI, and S6720S-EI. Other switch models do
not detect user traffic and send probe packets at n and 2n.)
– If user traffic passes the device during the 0-n period, the device
considers that the user is online at n, so it will not send a probe packet to
the user, but resets the handshake interval.
– If no user traffic passes the device during the 0-n period, the device
cannot determine whether the user is online at n, so it sends a probe
packet to the user. If the device receives the reply packet from the user, it
considers the user online and resets the handshake interval. If no reply
packet is received, it considers the user offline.
– If user traffic passes the device during the 2n-3n period, the device
considers that the user is online at 3n and resets the handshake interval.
– If no user traffic passes the device during the 2n-3n period, the device
cannot determine whether the user is online at 3n and considers that the
user is offline.
If the device considers that the user is offline at n, 2n, and 3n, the device
deletes all entries related to the user. To prevent the user from going offline
unexpectedly when no operation is performed on the PC, do not set a short
handshake period.
Example
# In the authentication profile p1, enable the handshake with pre-connection
users and authorized users.
<HUAWEI> system-view
[HUAWEI] authentication-profile name p1
[HUAWEI-authen-profile-p1] authentication handshake
Format
authentication control-direction { all | inbound }
Parameters
Parameter Description Value
all Configures bidirectional traffic control. -
Views
Authentication profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
By default, the access authentication device discards all the traffic sent from the
users who fail the 802.1x authentication or MAC address authentication. However,
these users can still receive packets broadcast from network devices to successfully
authenticated users in the same VLAN. To disable the users who fail the
authentication from receiving the broadcast packets, run the authentication
control-direction all command to configure bidirectional traffic control. To restore
the default situation, run the authentication control-direction inbound command
so that the device only controls the traffic sent from the users who fail the
authentication.
Precaution
● This function applies only to 802.1x authentication and MAC address
authentication.
● This function takes effect only when an access switch functions as the
authentication device and an interface of the switch is connected to only one
IP phone or PC.
● This function does not take effect when users have pre-connection entries or
authentication event entries. You are advised to run the undo authentication
Example
# Configure bidirectional traffic control in the authentication profile authen1.
<HUAWEI> system-view
[HUAWEI] authentication-profile name authen1
[HUAWEI-authen-profile-authen1] authentication control-direction all
Format
authentication device-type voice authorize [ service-scheme scheme-name ]
undo authentication device-type voice authorize [ service-scheme ]
Parameters
Parameter Description Value
Views
Authentication profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When both data terminals (such as PCs) and voice terminals (such as IP phones)
are connected to devices, NAC is configured on the devices to manage and control
the data terminals. The voice terminals, however, only need to connect to the
network without being managed and controlled. In this case, you can configure
the voice terminals to go online without authentication on the devices. Then the
voice terminals identified by the devices can go online without authentication.
Precautions
When a RADIUS server is used for dynamic VLAN delivery, the following RADIUS
attributes must be used: (064) Tunnel-Type (which must be set to VLAN or 13),
(065) Tunnel-Medium-Type (which must be set to 802 or 6), and (081) Tunnel-
Private-Group-ID (which can be set to the VLAN ID , VLAN description). To ensure
that the RADIUS server delivers VLAN attributes correctly, all the three RADIUS
attributes must be used. In addition, the Tunnel-Type and Tunnel-Medium-Type
attributes must be set to the specified values. When a voice VLAN is delivered, the
RADIUS attribute (26-33) HW-Voice-Vlan must also be used.
To enable the switches to identify the voice terminals, enable LLDP or configure
OUI for the voice VLAN on the switches. For details, see "Configuring Basic LLDP
Functions" in "LLDP Configuration" in the S1720, S2700, S5700, and S6720
V200R011C10 Configuration Guide - Network Management and Monitoring or
"Configuring a Voice VLAN Based on a MAC Address" in "Voice VLAN
Configuration" in the S1720, S2700, S5700, and S6720 V200R011C10
Configuration Guide - Ethernet Switching. If a voice device supports only CDP but
does not support LLDP, configure CDP-compatible LLDP on the switch using
16.3.16 lldp compliance cdp receive command.
To identify voice terminals in a policy association scenario, the voice VLAN OUI
must be configured.
After the voice VLAN function is enabled on an interface using the voice-vlan
enable command, authenticated voice terminals are authorized to use the voice
VLAN if the VLAN of the voice terminals is the same as the voice VLAN.
If you run this command repeatedly, the latest configuration overrides the
previous ones.
This function takes effect only for users who go online after this function is
successfully configured.
Example
# In the authentication profile p1, enable the device to allow voice terminals to go
online without authentication and assign the service scheme s1 to voice terminals
that are not authenticated.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] service-scheme s1
[HUAWEI-aaa-service-s1] quit
[HUAWEI-aaa] quit
[HUAWEI] authentication-profile name p1
[HUAWEI-authen-profile-p1] authentication device-type voice authorize service-scheme s1
Function
The authentication dot1x-mac-bypass command enables MAC address bypass
authentication.
Format
authentication dot1x-mac-bypass
Parameters
None
Views
Authentication profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can configure MAC address bypass authentication to authenticate terminals
such as printers that cannot have the 802.1X client installed.
After MAC address bypass authentication is enabled in an authentication profile,
the device performs 802.1X authentication for users using the authentication
profile. If the user name request times out, the device starts the MAC address
authentication process for the users.
Precautions
MAC address bypass authentication involves 802.1X authentication and MAC
address authentication. Before enabling this function in an authentication profile,
ensure that an 802.1X access profile and a MAC access profile have been bound to
the authentication profile.
Example
# In the authentication profile p1, enable MAC address bypass authentication.
<HUAWEI> system-view
[HUAWEI] authentication-profile name p1
[HUAWEI-authen-profile-p1] authentication dot1x-mac-bypass
Format
User authorization in the case of pre-connections:
authentication event pre-authen action authorize { vlan vlan-id | service-
scheme service-scheme-name | ucl-group ucl-group-name }
undo authentication event pre-authen action authorize
User authorization when authentication fails:
authentication event authen-fail action authorize { vlan vlan-id | service-
scheme service-scheme-name | ucl-group ucl-group-name } [ response-fail ]
undo authentication event authen-fail action authorize
Parameters
Parameter Description Value
service-scheme service- Specifies the name of the service The value must
scheme-name scheme based on which network be an existing
access rights are assigned to service scheme
users. name on the
device.
ucl-group ucl-group- Specifies the name of the UCL The value must
name group based on which network be an existing
access rights are assigned to UCL group name
users. on the device.
NOTE
This parameter is supported only by
the S5720EI, S5720HI, S6720EI, and
S6720S-EI.
Views
Authentication profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If users establish pre-connections with the device or fail to be authenticated, they
have no network access rights.
To meet these users' basic network access requirements such as updating the
antivirus database and downloading the client, configure authentication event
authorization information. The device will assign network access rights to these
users based on the authentication phase.
Precautions
Wireless 802.1X authentication does not support this function.
If no network access right is configured for users who fail authentication or when
the authentication server is Down, the users establish pre-connections with the
device after the authentication fails and then have the network access rights
mapping pre-connection users.
VLAN-based authorization does not apply to the authentication users who access
through VLANIF interfaces.
To use VLAN-based authorization (excluding authentication of pre-connection
users), run the 13.4.29 authentication pre-authen-access enable command to
disable the pre-connection function first.
An authorized VLAN cannot be delivered to online Portal users.
This function takes effect only for users who go online after this function is
successfully configured.
For S5720EI, S6720EI, and S6720S-EI, if the user upstream rate limit is configured
in the QoS profile bound to a service scheme, do not configure the device to use
the service scheme to grant network access rights to users in the pre-connection
phase. Otherwise, users go offline.
When the authentication server is in Down state, user authentication fails, or the
user is in pre-connection state, the redirection ACL function is not supported. For
details about this function, see 13.1.72 redirect-acl.
In 802.1X authentication for wired users, when the RADIUS server is Down, some
new clients do not have escape rights. For example, when a new Windows client
receives a Success packet from the device but does not receive the authentication
packets exchanged with the RADIUS server, the client will fail the authentication
and cannot go online. Currently, the following clients have escape rights when
they go online for the first time: H3C iNode clients using EAP-MD5 or PEAP and
Cisco AnyConnect clients using EAP-FAST or PEAP. For Windows clients, for
example, Windows 7, choose "Local Area Connection> Properties> Authentication>
Fallback to unauthorized network access".
Authentication event authorization information cannot be configured for static
users identified by IP addresses.
Example
# In the authentication profile authen1, configure the device to assign network
access rights specified in VLAN 10 to pre-connection users.
<HUAWEI> system-view
[HUAWEI] vlan batch 10
[HUAWEI] authentication-profile name authen1
[HUAWEI-authen-profile-authen1] authentication event pre-authen action authorize vlan 10
By default, the device does not re-authenticate users in the survival state when
the authentication server changes from Down to UP.
Format
authentication event authen-server-up action re-authen
Parameters
None
Views
Authentication profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The users in the survival state can only access limited network resources after the
device assigns specified network access rights to users who fail authentication
because the authentication server is Down. To meet the users' normal network
access requirements, the device needs to re-authenticate users in the survival state
in real time when the authentication server turns Up.
Prerequisites
The 13.2.46 radius-server testuser command has been configured in the RADIUS
server template so that the device can detect that the authentication server
changes from Down to Up.
NOTE
If the 13.2.46 radius-server testuser command is not configured and the device sets the status
of the authentication server to Down, the device will automatically set the status of the
authentication server to Up after the interval (configured using the 13.2.41 radius-server
retransmit timeout dead-time command) for the server to restore to the active state. The
device will not re-authenticate users.
Example
# In the authentication profile authen1, enable the device to re-authenticate
users when the authentication server turns Up from Down.
<HUAWEI> system-view
[HUAWEI] authentication-profile name authen1
[HUAWEI-authen-profile-authen1] authentication event authen-server-up action re-authen
Format
authentication event client-no-response action authorize { service-scheme
service-scheme-name | ucl-group ucl-group-name | vlan vlan-id }
undo authentication event client-no-response action authorize
Parameters
Parameter Description Value
Views
802.1X access profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If the 802.1X client does not respond, users cannot pass authentication and
thereby have no network access right. Before being successfully authenticated,
some users may need certain basic network access rights to download client
software and update the antivirus database. The network access rights can be
configured for the users when the 802.1X client does not respond, so that the
users can access specified network resources.
Precautions
Wireless 802.1X authentication does not support this function.
This function takes effect only for users who go online after this function is
successfully configured.
When an 802.1X client does not respond, the redirection ACL function is not
supported. For details about the function, see 13.1.72 redirect-acl.
Example
# In the 802.1X access profile d1, configure the device to assign the network
access rights specified in VLAN 10 for users when the 802.1X client does not
respond.
<HUAWEI> system-view
[HUAWEI] vlan batch 10
[HUAWEI] dot1x-access-profile name d1
[HUAWEI-dot1x-access-profile-d1] authentication event client-no-response action authorize vlan 10
Related Topics
13.4.64 display dot1x-access-profile configuration
Format
authentication event portal-server-down action authorize { service-scheme
service-scheme-name | ucl-group ucl-group-name }
undo authentication event portal-server-down action authorize
Parameters
Parameter Description Value
service-scheme service- Specifies the name of the service The value must
scheme-name scheme based on which network be an existing
access rights are assigned to service scheme
users. name.
ucl-group ucl-group- Specifies the name of the UCL The value must
name group based on which network be an existing
access rights are assigned to UCL group name.
users.
NOTE
This parameter is only supported by
the S5720EI, S5720HI, S6720EI, and
S6720S-EI.
Views
Portal access profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If the Portal server is Down, users cannot pass the authentication and thereby
have no network access right. Before being successfully authenticated, some users
may need certain basic network access rights to download client software and
update the antivirus database. The network access rights can be configured for
the users when the Portal server is Down, so that the users can access specified
network resources.
Prerequisites
A UCL group has been created using the ucl-group command in the system view.
A service scheme has been created using the service-scheme command in the
AAA view.
Precautions
● This function takes effect only for users who go online after this function is
successfully configured.
● Only HTTP messages-triggered Portal authentication users support this
function.
● Before enabling the access device to assign network access rights to users
when the Portal server is Down, enable the heartbeat detection function on
the Portal server and run the server-detect command on the access device to
enable the Portal server detection function.
● When the Portal server is in Down state, the redirection ACL function is not
supported. For details about this function, see 13.1.72 redirect-acl.
Example
# In the Portal access profile p1, configure the device to assign network access
rights based on the service scheme s1 to users when the Portal server is Down.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] service-scheme s1
[HUAWEI-aaa-service-s1] quit
[HUAWEI-aaa] quit
[HUAWEI] portal-access-profile name p1
[HUAWEI-portal-acces-profile-p1] authentication event portal-server-down action authorize service-
scheme s1
Related Topics
13.4.77 display portal-access-profile configuration
Format
authentication event portal-server-up action re-authen
undo authentication event portal-server-up action re-authen
Parameters
None
Views
Portal access profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If the device is configured to assign network access rights to users when the Portal
server is Down, users can access limited network resources after the device detects
that the Portal server is Down. To ensure that users can obtain normal network
access rights after the Portal server goes Up, you can enable the device to re-
authenticate users when the Portal server changes from Down to Up. After the
Portal server goes Up, the device sets the status of users who display web-server-
down to pre-connection. The re-authentication process starts when the users visit
any web page. If the authentication succeeds, the device assigns normal network
access rights to the users.
Precautions
● This command does not apply to users connected to the route main interface.
● This function takes effect only for users who go online after this function is
successfully configured.
● Before enabling the access device to assign network access rights to users
when the Portal server is Down, enable the heartbeat detection function on
the Portal server and run the server-detect command on the access device to
enable the Portal server detection function.
Example
# In the Portal access profile p1, enable the device to re-authenticate users when
the Portal server turns Up from Down.
<HUAWEI> system-view
[HUAWEI] portal-access-profile name p1
[HUAWEI-portal-acces-profile-p1] authentication event portal-server-up action re-authen
Related Topics
13.4.77 display portal-access-profile configuration
Function
The authentication mac-move enable command enables MAC address
migration.
Format
authentication mac-move enable vlan { all | { vlan-id1 [ to vlan-id2 ] } & <1–
10> }
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a user is authenticated and accesses the network from one interface of the
device, the network cable is pulled out from the interface and plugged in another
interface on the device. In this case, the user cannot immediately initiate
authentication and access the network. The user can initiate authentication on the
current interface only after the user offline detection interval expires or the
authentication interface is manually enabled and shut down to clear user online
entries. To improve user experience, MAC address migration is enabled so that the
user can immediately initiate authentication and access the network after be
switched to another access interface.
In addition, VLANs need to be specified for users in MAC address migration. The
VLANs before and after the migration can be specified for the users, and they can
be the same or different.
Precautions
Example
# Enable MAC address migration in all VLANs.
<HUAWEI> system-view
[HUAWEI] authentication mac-move enable vlan all
Format
authentication mac-move detect enable
undo authentication mac-move detect enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
To prevent unauthorized users from spoofing online users to attack a device, run
the authentication mac-move detect enable command to enable the device to
detect users' online status before user MAC address migration. If no users are
online, the device permits MAC address migration and allows users to go online
from a new access interface. If a user is online, the device terminates MAC address
migration and does not allow the user to go online from a new access interface.
You can also run the 13.4.24 authentication mac-move detect retry-interval
retry-time command to set the detection interval and maximum number of
detections before user MAC address migration.
After the authentication mac-move detect enable command is configured in an
authentication profile, the authentication profile cannot be bound to a VAP
profile.
Example
# Enable a device to detect users' online status before user MAC address
migration.
<HUAWEI> system-view
[HUAWEI] authentication mac-move detect enable
Format
authentication mac-move detect { retry-interval interval | retry-time times } *
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After a device is enabled to detect users' online status before user MAC address
migration, if no users are online, the device permits MAC address migration and
allows users to go online from a new access interface. If a user is online, the
device terminates MAC address migration and does not allow the user to go
online from a new access interface. You can run the authentication mac-move
Example
# Configure a device to detect users' online status twice at an interval of 5
seconds before user MAC address migration.
<HUAWEI> system-view
[HUAWEI] authentication mac-move detect retry-interval 5 retry-time 2
Format
authentication mac-move quiet-log enable
undo authentication mac-move quiet-log enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The device can record logs when adding or deleting MAC address migration quiet
entries. This helps the administrator to find out the cause for MAC address
migration failure, and improves maintainability of the MAC address migration
quiet function.
Example
# Enable the device to record logs about MAC address migration quiet.
<HUAWEI> system-view
[HUAWEI] authentication mac-move quiet-log enable
Format
authentication mac-move { quiet-times times | quiet-period quiet-value } *
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When users frequently switch access interfaces (especially frequent switching due
to loops), the device needs to process a large number of authentication packets
and entries, which results in high CPU usage. To solve this problem, configure the
MAC address migration quiet function.
If the number of MAC address migration times for a user within 60 seconds
exceeds the value (times) after the MAC address migration quiet function is
enabled, the device quiets the user for a certain period (quiet-value). During the
quiet period, the device does not allow users to perform MAC address migration.
Example
# Configure the quiet period to 120 seconds and the maximum number of MAC
address migration times within 60 seconds before users enter the quiet state to 5.
<HUAWEI> system-view
[HUAWEI] authentication mac-move quiet-times 5 quiet-period 120
By default, the device is disabled from sending alarms about MAC address
migration quiet.
Format
authentication mac-move quiet-user-alarm enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The device can send alarms about MAC address migration quiet to improve
maintainability of the MAC address migration quiet function. The device sends
alarms when the percentage of the actual user amount in the MAC address
migration quiet table against the maximum number of users exceeds the upper
alarm threshold configured. If the percentage decreases to be equal to or smaller
than the lower alarm threshold, the device sends a clear alarm. The upper and
lower alarm thresholds are configured using the 13.4.28 authentication mac-
move quiet-user-alarm percentage command.
Example
# Enable the device to send alarms about MAC address migration quiet.
<HUAWEI> system-view
[HUAWEI] authentication mac-move quiet-user-alarm enable
Function
The authentication mac-move quiet-user-alarm percentage command
configures the upper and lower alarm thresholds for the percentage of MAC
address migration users in quiet state.
By default, the lower alarm threshold is 50 and upper alarm threshold is 100.
Format
authentication mac-move quiet-user-alarm percentage lower-threshold upper-
threshold
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The 13.4.27 authentication mac-move quiet-user-alarm enable command can
be run to enable the device to send alarms about MAC address migration quiet to
improve maintainability of the MAC address migration quiet function. The device
sends alarms when the percentage of the actual user amount in the MAC address
migration quiet table against the maximum number of users exceeds the upper
alarm threshold configured. If the percentage decreases to be equal to or smaller
than the lower alarm threshold, the device sends a clear alarm. The upper and
lower alarm thresholds are configured using the authentication mac-move
quiet-user-alarm percentage command.
Example
# Configure the upper alarm threshold to 80 and lower alarm threshold to 40.
<HUAWEI> system-view
[HUAWEI] authentication mac-move quiet-user-alarm percentage 40 80
Format
authentication pre-authen-access enable
undo authentication pre-authen-access enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Precautions
This function does not take effect for users who use Portal authentication or
combined authentication (including Portal authentication).
The undo authentication pre-authen-access enable command does not take effect
for pre-connection users for whom network access permissions are configured.
If the device connects to some terminals such as a MacBook laptop that is not
authenticated after obtaining an IP address, it is recommended that you run the
undo authentication pre-authen-access enable command on the device to
disable the pre-connection function and then connect the terminal to the network
again.
Example
# Disable the function of keeping users who fail to be authenticated and do not
have any network access rights in the pre-connection state.
<HUAWEI> system-view
[HUAWEI] undo authentication pre-authen-access enable
Function
The authentication timer handshake-period command sets the handshake
interval of the device with pre-connection users and authorized users.
The default handshake interval of the device with pre-connection users and
authorized users is 300 seconds.
Format
authentication timer handshake-period handshake-period
Parameters
Parameter Description Value
Views
Authentication profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After enabling the handshake with pre-connection users and authorized users
using the 13.4.13 authentication handshake command, you can run the this
command to set the handshake interval. After that, if a user does not respond to
the handshake request from the device within the handshake interval, the device
deletes the user entry.
Precautions
Example
# In the authentication profile p1, set the handshake interval of the device with
pre-connection users and authorized users to 200 seconds.
<HUAWEI> system-view
[HUAWEI] authentication-profile name p1
[HUAWEI-authen-profile-p1] authentication timer handshake-period 200
Format
authentication timer authen-fail-aging aging-time
undo authentication timer authen-fail-aging
Parameters
Parameter Description Value
aging-time Specifies the aging The value is an integer that ranges from 0 or
time. 60 to 4294860, in seconds.
The value 0 indicates that the entry does not
age.
Views
Authentication profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After network access policies are configured for users who fail to be
authenticated, the device creates entries for these users. If the user still fails to be
authenticated when the user aging time expires, the user entry is deleted.
The entries of the users who fail to be authenticated share device resources with
the entries of the users who are authenticated. If there are excess entries of the
users who fail to be authenticated, other users fail to be authenticated. To solve
this problem, run the authentication timer authen-fail-aging command to
reduce the aging time for entries of the users who fail to be authenticated. In
addition, if the time that the users who fail to be authenticated have network
access policies should be shortened, you can run this command to decrease the
aging time for the user entries.
Precautions
This function takes effect only for users who go online after this function is
successfully configured.
Only wired users support this function.
Example
# In the authentication profile p1, configure the aging time for entries of the users
who fail to be authenticated to 3600 seconds.
<HUAWEI> system-view
[HUAWEI] authentication-profile name p1
[HUAWEI-authen-profile-p1] authentication timer authen-fail-aging 3600
Format
authentication timer pre-authen-aging aging-time
undo authentication timer pre-authen-aging
Parameters
Parameter Description Value
aging-time Specifies the aging The value is an integer that ranges from 0 or
time. 60 to 4294860, in seconds.
The value 0 indicates that the entry does not
age.
Views
Authentication profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a pre-connection is established between the device and a user, the device
creates the pre-connection user entry. If the user still fails to be authenticated
when the user aging time expires, the user entry is deleted.
The pre-connection user entries share device resources with the entries of the
users who are authenticated. If there are excess pre-connection user entries, other
users fail to be authenticated. To solve this problem, run the authentication
timer pre-authen-aging command to reduce the aging time for the pre-
connection user entries. In addition, if the time that the pre-connection users have
network access policies should be extended, you can run this command to increase
the aging time for the pre-connection user entries.
Precautions
This function takes effect only for users who go online after this function is
successfully configured.
Only wired users support this function.
Example
# In the authentication profile p1, configure the aging time for the pre-connection
user entries to 3600 seconds.
<HUAWEI> system-view
[HUAWEI] authentication-profile name p1
[HUAWEI-authen-profile-p1] authentication timer pre-authen-aging 3600
Format
authentication timer re-authen { pre-authen re-authen-time | authen-fail re-
authen-time }
undo authentication timer re-authen { pre-authen | authen-fail }
Parameters
Parameter Description Value
pre-authen re- Specifies the interval The value is an integer that ranges
authen-time for re-authenticating from 0 or 30 to 7200, in seconds.
pre-connection users.
The value 0 indicates that the re-
authentication function is disabled for
pre-connection users.
authen-fail re- Specifies the interval The value is an integer that ranges
authen-time for re-authenticating from 0 or 30 to 7200, in seconds.
users who fail to be
authenticated. The value 0 indicates that the re-
authentication function is disabled for
users who fail to be authenticated.
Views
Authentication profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The device creates the mapping user entries when network access policies are
assigned to users who are in the pre-connection phase or fail authentication. To
enable users to pass authentication in real time, the device periodically re-
authenticates the users who are in the pre-connection phase or fail authentication
according to the user entries. The administrator can adjust the re-authentication
interval based on the actual network requirements.
Precautions
This command only applies to 802.1X authentication and MAC address
authentication.
This function takes effect only for users who go online after this function is
successfully configured.
The device cannot re-authenticate wireless users who are in the pre-connection
phase or fail authentication. Therefore, the authentication timer re-authen
command does not apply to wireless users.
To reduce the impact on the device performance when many users exist, the user
re-authentication interval may be longer than the configured re-authentication
interval.
If a static user configured with 802.1X authentication enters the pre-connection
status after failing the authentication, 802.1X authentication is then performed.
During the 802.1X authentication, the pre-authen re-authen-time timer does not
take effect. If the 802.1X authentication also fails, the pre-authen re-authen-time
timer takes effect, and re-authentication is triggered according to this timer.
Example
# In the authentication profile authen1, set the interval for re-authenticating
users who fail to be authenticated to 300 seconds.
<HUAWEI> system-view
[HUAWEI] authentication-profile name authen1
[HUAWEI-authen-profile-authen1] authentication timer re-authen authen-fail 300
Related Topics
13.4.61 display authentication-profile configuration
NOTE
Format
authentication wlan-max-user max-user-number
Parameters
Parameter Description Value
Views
Authentication profile view
Default Level
2: Configuration level
Usage Guidelines
To ensure high-quality network access services for online users in high-density
wireless access scenarios, the administrator needs to limit the number of
authenticated users to prevent excess access users from degrading user
experience. The administrator can run the authentication wlan-max-user
command to limit the number of access users allowed on a VAP of a single AP.
NOTE
This function takes effect only when the authentication profile is bound to the VAP profile.
Example
# In the authentication profile authen1, set the maximum number of allowed
authenticated users to 100 on a VAP.
<HUAWEI> system-view
[HUAWEI] authentication-profile name authen1
[HUAWEI-authen-profile-authen1] authentication wlan-max-user 100
Function
The authentication mode command configures the user access mode.
The undo authentication mode command restores the default user access mode.
Format
authentication mode { single-terminal | single-voice-with-data | multi-share |
multi-authen [ max-user max-user-number [ dot1x | mac-authen | portal ] * ] }
Parameters
Views
Authentication profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After enabling NAC authentication, you can configure a user access mode based
on the user access on the interface. The user access modes include:
Example
# In the authentication profile p1, set the user access mode to multi-authen.
<HUAWEI> system-view
[HUAWEI] authentication-profile name p1
[HUAWEI-authen-profile-p1] authentication mode multi-authen
Format
authentication single-access
undo authentication single-access
Parameters
None
Views
Authentication profile view
Default Level
2: Configuration level
Usage Guidelines
After hybrid authentication is configured, the device by default allows users to
access in different authentication modes. You can run the authentication single-
access command to disable this default function. The device then allows users to
access in only one authentication mode and does not process the packets of other
authentication modes.
Example
# In the authentication profile authen1, configure the device to allow users to
access in only one authentication mode.
<HUAWEI> system-view
[HUAWEI] authentication-profile name authen1
[HUAWEI-authen-profile-authen1] authentication single-access
By default, the device does not dynamically adjust the rate of packets from NAC
users.
Format
authentication speed-limit auto
undo authentication speed-limit auto
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When a lot of NAC users send authentication or log off requests to the device, the
CPU usage may be overloaded especially when the CPU or memory usage is
already high (for example, above 80%). After the device is enabled to dynamically
adjust the rate of packets from NAC users, the device limits the number of NAC
packets received per second if the CPU or memory usage is high. This function
reduces loads on the device CPU.
Example
# Enable the device to dynamically adjust the rate of packets from NAC users.
<HUAWEI> system-view
[HUAWEI] authentication speed-limit auto
Format
authentication unified-mode
undo authentication unified-mode
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Compared with the common mode, the unified mode uses the modular
configuration, making the configuration clearer and configuration model easier to
understand.
Considering advantages of the unified mode, you are advised to deploy NAC in
unified mode. You can run the authentication unified-mode command to switch
the NAC mode to unified mode.
Precautions
● Starting from V200R005C00, the default NAC mode changes from common
mode to unified mode. Therefore, if the system software of a switch is
upgraded from a version earlier than V200R005C00 to V200R005C00 or a
later version, the switch automatically runs the undo authentication unified-
mode command to configure the NAC mode to common mode.
● After the common mode and unified mode are switched, the device
automatically restarts, causing service interruption.
● In V200R008C00, some NAC commands do not differentiate the common and
unified modes. Their formats and views remain unchanged after being
switched from one mode to the other. After devices are switched from the
common mode in V200R008C00 or later versions to the unified mode in
V200R009C00 or later versions, these NAC commands can be switched to the
unified mode.
● In the unified mode, only the commands of the common mode are
unavailable; in the common mode, only the commands of the unified mode
are unavailable. In addition, after the configuration mode is switched, the
commands supported by both the common mode and unified mode still take
effect.
Example
# Switch the NAC mode to unified mode.
<HUAWEI> system-view
[HUAWEI] authentication unified-mode
Format
authentication trigger-condition { dhcp | arp | any-l2-packet } *
Parameters
Parameter Description Value
dhcp Triggers 802.1X authentication through DHCP packets. -
Views
802.1X access profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After 802.1X authentication is enabled, the device can trigger 802.1X
authentication on users by default when receiving DHCP or ARP packets. Based on
user information on the actual network, the administrator can adjust the packet
types that can trigger 802.1X authentication. For example, if all users on a
network dynamically obtain IPv4 addresses, the device can be configured to
trigger 802.1X authentication only through DHCP packets. This prevents the device
from continuously sending ARP packets to trigger 802.1X authentication when
static IPv4 addresses are configured for unauthorized users on the network, and
reduces device CPU occupation.
If a static IPv4 address is configured for a client, 802.1X authentication cannot be
triggered because they do not exchange DHCP or ARP packets. You can run the
authentication trigger-condition any-l2-packet command to trigger 802.1X
authentication through any Layer 2 packets. To prevent unauthorized users from
occupying user entries on the device maliciously, you are advised to configure the
function of triggering 802.1X authentication through any packets on the access
device, and run the authentication mode max-user max-user-number command
in the authentication profile view to configure the maximum number of access
users allowed on an interface. The recommended value is 10.
Precautions
This function takes effect only for users who go online after this function is
successfully configured.
To allow BPDUs to trigger 802.1X authentication, you must enable the function
corresponding to the BPDUs globally. For example, to allow LLDPDUs to trigger
802.1X authentication, run the 16.3.20 lldp enable (system view) command to
enable LLDP globally.
When any-l2-packet is configured and 802.1X authentication is enabled on an
interface, EAP packets sent from a client trigger 802.1X authentication first.
In a policy association scenario, MAC address authentication can only be triggered
by EAP or DHCP or ARP packets.
When MAC address authentication and 802.1X authentication are both enabled on
an interface, packets that can trigger authentication include all the packet types
that can trigger authentication in the MAC access profile and 802.1X access
profile. For example, assume that ARP packets in the MAC access profile are
unable to trigger authentication and ARP packets in the 802.1X access profile can
trigger authentication. If MAC address authentication and 802.1X authentication
are both enabled on an interface, ARP packets can trigger MAC address
authentication.
Example
# In the 802.1X access profile d1, configure the device to use DHCP packets to
trigger 802.1X authentication.
<HUAWEI> system-view
[HUAWEI] dot1x-access-profile name d1
[HUAWEI-dot1x-access-profile-d1] authentication trigger-condition dhcp
Format
authentication trigger-condition { dhcp | arp | dhcpv6 | nd | any-l2-packet } *
Parameters
Parameter Description Value
dhcp Triggers MAC address authentication through DHCP -
packets.
Views
MAC access profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After MAC address authentication is enabled, the device can trigger MAC address
authentication on users by default when receiving DHCP/ARP/DHCPv6/ND
packets. Based on user information on the actual network, the administrator can
adjust the packet types that can trigger MAC address authentication. For example,
if all users on a network dynamically obtain IPv4 addresses, the device can be
configured to trigger MAC address authentication only through DHCP packets.
This prevents the device from continuously sending ARP packets to trigger MAC
address authentication when static IPv4 addresses are configured for unauthorized
users on the network, and reduces device CPU occupation.
802.1X access profile. For example, assume that ARP packets in the MAC
access profile are unable to trigger authentication and ARP packets in the
802.1X access profile can trigger authentication. If MAC address
authentication and 802.1X authentication are both enabled on an interface,
ARP packets can trigger MAC address authentication.
Example
# In the MAC access profile m1, configure the device to trigger MAC address
authentication only through ARP packets.
<HUAWEI> system-view
[HUAWEI] mac-access-profile name m1
[HUAWEI-mac-access-profile-m1] authentication trigger-condition arp
Format
authentication trigger-condition dhcp dhcp-option option-code
undo authentication trigger-condition dhcp dhcp-option option-code
Parameters
Parameter Description Value
option-code Specifies the option that the device sends The value is fixed as 82.
to the authentication server.
Views
MAC access profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Option82 records information about DHCP user locations and services (voice and
data services). After this command is run, if the device can trigger MAC address
authentication through DHCP packets, it sends Option82 information to the
authentication server when triggering MAC address authentication through DHCP
packets. Based on the user information recorded in Option82, the authentication
server then assigns different network access rights to users with different services
in different locations. This implements accurate control on the network access
rights of each user.
Precautions
● MAC address authentication users who go online through VLANIF interfaces
do not support this function.
● This function takes effect only for users who go online after this function is
successfully configured.
● Only wired users support MAC address authentication triggered by
DHCP/ARP/DHCPv6/ND/any packets. For wireless users, MAC address
authentication is triggered by association packets.
Example
# In the MAC access profile m1, enable the device to send Option82 information
to the authentication server when triggering MAC address authentication through
DHCP packets.
<HUAWEI> system-view
[HUAWEI] mac-access-profile name m1
[HUAWEI-mac-access-profile-m1] authentication trigger-condition dhcp dhcp-option 82
Format
authentication-profile authentication-profile-name
undo authentication-profile
Parameters
Parameter Description Value
Views
Interface view, or VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
An authentication profile uniformly manages NAC configuration. The
authentication profile is bound to the interface or VAP profile view to enable NAC,
implementing access control on the users in the interface or VAP profile. The
authentication type of the users in the interface or VAP profile is determined by
the access profile bound to the authentication profile.
Prerequisites
An authentication profile has been created using the 13.4.43 authentication-
profile (system view) command in the system view.
Precautions
When configuring NAC, pay attention to the following points:
● VLANIF interfaces, Ethernet interfaces, GE interfaces, MultiGE interfaces, XGE
interfaces, 40GE interfaces, Eth-Trunks, port groups, and VAP profiles support
NAC. The support for NAC on different interfaces is as follows:
– 802.1X authentication does not take effect on a VLANIF interface.
– Layer 2 interfaces and VLANIF interfaces support MAC address
authentication. (Only S5720EI, S1720X, S1720X-E, S5720HI, S5720S-SI,
S5720SI, S5730S-EI, S5730SI, S6720LI, S6720S-LI, S6720S-SI, S6720SI,
S6720EI, and S6720S-EI support configuration of MAC address
authentication on VLANIF interfaces.)
– The support for Portal authentication varies depending on different
interfaces, routed main interfaces (Only S5720EI, S5720HI, S6720EI, and
S6720S-EI) support only Layer 3 Portal authentication, Layer 2 interfaces
support only Layer 2 Portal authentication, and VLANIF interfaces support
both Layer 2 and Layer 3 Portal authentication.
– The VLANIF interface corresponding to the super VLAN does not support
Portal authentication.
● For the access of wireless users through APs, ensure that the APs can be
authenticated (for example, adding the APs to static users) when NAC
authentication is deployed for users. Otherwise, the wireless users cannot be
authenticated.
● NAC authentication cannot be enabled both on a Layer 2 Ethernet interface
and the VLANIF interface mapping the VLAN of the Ethernet interface.
Otherwise, the users have no network access rights after connecting to the
network. In wireless scenarios, NAC authentication cannot be enabled both in
Example
# Apply the authentication profile m1 to VLANIF10.
<HUAWEI> system-view
[HUAWEI] authentication-profile name m1
[HUAWEI-authen-profile-m1] quit
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] authentication-profile m1
Format
authentication-profile name authentication-profile-name
undo authentication-profile name authentication-profile-name
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
NAC can implement access control on users. The device uses authentication
profiles to uniformly manage NAC configuration so that users can easily configure
NAC functions. The parameters (for example, the bound access profile and
authentication type) in the authentication profile can be configured to provide
various access control modes for different users. After the configuration is
complete, the authentication profile is applied to the interface or VAP profile to
enable NAC.
Follow-up Procedure
Example
# Create the authentication profile named mac_authen_profile1.
<HUAWEI> system-view
[HUAWEI] authentication-profile name mac_authen_profile1
Related Topics
13.4.110 dot1x-access-profile (authentication profile view)
13.4.124 mac-access-profile (authentication profile view)
13.4.170 portal-access-profile (authentication profile view)
13.4.61 display authentication-profile configuration
Format
authentication update-ip-accounting enable
undo authentication update-ip-accounting enable
Parameters
None
Views
Authentication profile view
Default Level
2: Configuration level
Usage Guidelines
By default, the device sends accounting packets for address updating to the
accounting server. Some accounting servers may not require the accounting
packets. In this case, resources on the device are occupied. You can run the undo
authentication update-ip-accounting enable command to disable the device
from sending accounting packets for address updating, saving resources on the
device. After address updating are complete, the device sends accounting packets
again and the accounting function is not affected.
● update-info-accounting indicates that accounting packets are immediately
sent during address updating.
● If the terminal information (including the DHCP Option, UA, or LLDP
information) is updated for the first time, the device immediately triggers
real-time accounting. If the terminal information is not updated for the first
time, the device only updates the user entry and reports the new terminal
information through subsequent accounting messages.
● After the undo authentication update-ip-accounting enable command is
configured, the device does not send the accounting packet immediately after
obtaining the packet, and waits until the real-time accounting timer expires.
Example
# Disable a device from sending accounting packets for address updating.
<HUAWEI> system-view
[HUAWEI] authentication-profile name test
[HUAWEI-authen-profile-test] undo authentication update-ip-accounting enable
NOTE
Format
band-width share-mode
undo band-width share-mode
Parameters
None
Views
System view, AAA domain view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
On a home network, all family members go online using the same account. To
improve service experience of family members, you can enable the bandwidth
share mode so that all members can share the bandwidth.
Precautions
● This function does not apply to users who are connected through the inter-
card Eth-Trunk interface.
● If this command is run in the system view, it takes effect for all new online
users who connected to the device. If this command is run in the AAA domain
view, it takes effect only for new online users in the domain.
● If the local or remote RADIUS server does not assign CAR settings to the users
who will go online and the online users, the share mode is invalid to the
users.
● If the bandwidth share mode is enabled and different users use the same
account for authentication, the users going online with no CAR settings
assigned will not be affected when CAR settings are assigned to the users
who go online later.
Example
# Enable the bandwidth share mode in the system view.
<HUAWEI> system-view
[HUAWEI] band-width share-mode
Function
The cut access-user ucl-group command forces UCL group users offline.
NOTE
This command is supported only by the S5720EI, S5720HI, S6720EI, and S6720S-EI.
Format
cut access-user ucl-group { group-index | name group-name }
Parameters
Parameter Description Value
name group-name Specifies the name of a The UCL group must exist.
UCL group.
Views
AAA view
Default Level
3: Management level
Usage Guidelines
After a user goes online, if you want to modify the user's network access rights or
detect that the user is unauthorized, run this command to force the user offline.
Example
# Force UCL group users offline.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] cut access-user ucl-group name huawei
13.4.47 device-type
Function
The device-type command sets a terminal type identifier.
The undo device-type command deletes a terminal type identifier that has been
set.
By default, no terminal type identifier exists in the system.
NOTE
Format
device-type device-name
undo device-type
Parameters
Parameter Description Value
Views
Terminal type identification profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a terminal type identifier is configured in a terminal type identification
profile, the terminal type can be identified in the profile. Assume that the terminal
type identifier is set to huawei. If the MAC address, UA, or DHCP Option
information that an AC receives from a terminal matches the identification rule
configured in the terminal type profile, the terminal type is huawei. This helps
administrators to perform access control and rights management for the terminal
based on the identified terminal type.
Precautions
The device-type command is cyclic in nature, and only the latest configuration
takes effect.
Example
# In the terminal type identification profile huawei, configure the terminal type
identifier huawei_1.
<HUAWEI> system-view
[HUAWEI] device-profile profile-name huawei
[HUAWEI-device-profile-huawei] device-type huawei_1
Related Topics
13.4.62 display device-profile
13.4.48 device-profile
Function
The device-profile command creates a terminal type identification profile and
enters the terminal type identification profile view, or directly enters the view of a
terminal type identification profile that has already been created.
The undo device-profile command deletes a terminal type identification profile
that has been created.
By default, no terminal type identification profile is created.
NOTE
This function is only supported by the S5720HI and the function takes effect only for
wireless access users.
The AP3010DN-AGN does not support terminal type identification.
Format
device-profile profile-name profile-name
undo device-profile { all | profile-name profile-name }
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
With the development of Internet, many enterprises allow employees to wirelessly
access the enterprise intranet using their own intelligent devices such as
Example
# Create a terminal type identification profile named huawei.
<HUAWEI> system-view
[HUAWEI] device-profile profile-name huawei
Related Topics
13.4.62 display device-profile
Format
device-sensor dhcp option option-code &<1-6>
undo device-sensor dhcp option option-code &<1-6>
Parameters
Parameter Description Value
option-code Specifies the DHCP option field that the The value is an
device needs to resolve. integer that ranges
from 1 to 254.
The option fields in a DHCP packet carry the
control information and parameters, for
example, terminal type.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A device usually connects to many types of terminals. You may need to assign
different network access rights or packet processing priorities to the terminals of
different types. For example, the voice devices, such as IP phones, should be
assigned a high packet processing priority because voice signals require low delay
and jitter.
After the DHCP-based terminal type awareness function is enabled, the device can
resolve the option fields that carry terminal type information in the received DHCP
Request packets. The device then sends the option information to the RADIUS
server through RADIUS accounting packets. Through the option information, the
RADIUS server knows the terminal types and controls the network access rights
and packet processing priorities of the terminals.
Precautions
● The command takes effect only when the authentication or accounting mode
in the AAA scheme is RADIUS.
● To make this command take effect, you must run the 14.8.20 dhcp snooping
enable command on the interfaces or in VLANs.
Example
# Set the option fields to be resolved by the device to option 60.
<HUAWEI> system-view
[HUAWEI] device-sensor dhcp option 60
Function
The device-sensor lldp tlv command enables the LLDP-based terminal type
awareness function.
The undo device-sensor lldp tlv command disables the LLDP-based terminal type
awareness function.
Format
device-sensor lldp tlv tlv-type &<1-4>
Parameters
Parameter Description Value
tlv-type Specifies the The value is an integer that can be 1, 2, 5, 6, 7, 8,
LLDP TLV type as and 127. The values are as follows:
the terminal ● 1: Chassis ID TLV, indicating the bridge MAC
type to be aware address of the device
of the device.
● 2: Port ID TLV, indicating the port identifying
the LLD PDU sending end
● 5: System Name TLV, indicating the device
name
● 6: System Description TLV, indicating the
system description
● 7: System Capabilities TLV, indicating the
system capabilities
● 8: Management Address TLV, indicating the
management address
● 127: Organization Specific TLV, indicating the
user-defined organization information. You can
run the lldp tlv-enable med-tlv command on
the physical interface for user access to set this
parameter.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A device usually connects to many types of terminals. You may need to assign
different network access rights or packet processing priorities to the terminals of
different types. For example, the voice devices, such as IP phones, should be
assigned a high packet processing priority because voice signals require low delay
and jitter.
Using the LLDP-based terminal type awareness function, the device parses the
required TLV type containing terminal type information from the received LLDP
packets. The device then sends the TLV type information to the RADIUS server
through a RADIUS accounting packet. Through the TLV type information, the
RADIUS server knows the terminal types and controls the network access rights
and packet processing priorities of the terminals.
Precautions
● The command takes effect only when the authentication or accounting mode
in the AAA scheme is RADIUS.
● The command takes effect only when the LLDP function is enabled on the
device and the connected peer device.
Example
# Enable the terminal type awareness function based on LLDP TLV type 5.
<HUAWEI> system-view
[HUAWEI] device-sensor lldp tlv 5
Related Topics
13.4.49 device-sensor dhcp option
Function
The display aaa statistics access-type-authenreq command displays the number
of requests for MAC, Portal, or 802.1X authentication.
Format
display aaa statistics access-type-authenreq
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
When users send authentication requests, the device collects statistics on the
number of initiating MAC, Portal, or 802.1X authentications.
To view the number of requests for MAC, Portal, or 802.1X authentication, run the
display aaa statistics access-type-authenreq command.
Example
# Display the number of requests for MAC, Portal, or 802.1X authentication.
<HUAWEI> display aaa statistics access-type-authenreq
mac authentication request :2
portal authentication request :0
dot1x authentication request :0
Format
display access-context profile [ name profile-name ]
Parameters
Parameter Description Value
name profile- Displays the configuration of the user The value must be
name context profile with a specified name. the name of an
If name profile-name is not specified, all existing user context
user context profiles configured on the profile on the
device are displayed. device.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After configuring a user context profile, you can run this command to check
whether the configuration is correct.
Example
# Display all user context profiles configured on the device.
<HUAWEI> display access-context profile
-------------------------------------------------------------------------------
ID Access-context profile name
-------------------------------------------------------------------------------
0 p1
1 aA
-------------------------------------------------------------------------------
Total 2, printed 2
Item Description
Item Description
Format
display access-author policy [ name policy-name ]
Parameters
Parameter Description Value
name policy- Displays the configuration of the user The value must be
name authentication event authorization policy the name of an
with a specified name. existing user
If name policy-name is not specified, all authentication
user authentication event authorization event authorization
policies configured on the device are policy on the device.
displayed.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After configuring a user authentication event authorization policy, you can run this
command to check whether the configuration is correct.
Example
# Display all user authentication event authorization policies configured on the
device.
<HUAWEI> display access-author policy
-------------------------------------------------------------------------------
Item Description
Function
The display access-user dot1x-identity statistics command displays statistics
about Identity packets for wireless 802.1X authentication on a switch.
NOTE
Format
display access-user dot1x-identity statistics
Parameters
None
Views
All views
Default Level
3: Management level
Usage Guidelines
You can run this command to view the statistics about Identity packets for wireless
802.1X authentication on a switch.
Example
# Display statistics about Identity packets for wireless 802.1X authentication on
the switch.
<HUAWEI> display access-user dot1x-identity statistics
-----------------------------------------------------------------------
Receive(Packet) Pass(Packet) Drop(Packet) Last-dropping-time
-----------------------------------------------------------------------
0 0 0 -
-----------------------------------------------------------------------
Item Description
Function
The display access-user command displays information about NAC access users.
Format
display access-user service-scheme service-scheme
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to check information about online NAC users.
Example
# Display information about users who are assigned the service scheme huawei.
<HUAWEI> display access-user service-scheme huawei
------------------------------------------------------------------------------
UserID Username IP address MAC Status
------------------------------------------------------------------------------
16018 zqm 10.12.12.254 78ac-c0c2-0175 Pre-authen
------------------------------------------------------------------------------
Total: 1, printed: 1
NOTE
Only letters, digits, and special characters can be displayed for username.
When the value of username contains special characters or characters in other languages
except English, the device displays dots (.) for these characters. If there are more than three
such consecutive characters, three dots (.) are displayed. Here, the special characters are the
ASCII codes smaller than 32 (space) or larger than 126 (~).
When the value of username is longer than 20 characters, the device displays up to three dots
(.) for the characters following 19; that is, only 22 characters are displayed.
Item Description
NOTE
Format
display access-user-num [ interface wlan-dbss wlan-dbss-interface-id ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After configuring the maximum number of authenticated users allowed in a VAP
profile, you can run the display access-user-num command to view the
maximum number of concurrent users and the number of current online users.
Example
# Display the maximum number of concurrent users and the number of current
online users on all VAPs.
<HUAWEI> display access-user-num
2016-09-30 11:09:27.790
----------------------------------------------------------------------
Interface name max-user-num online-user-num
----------------------------------------------------------------------
Wlan-Dbss0 30 10
Wlan-Dbss1 2 0
----------------------------------------------------------------------
Total: 8, printed: 2
Format
display authentication mac-move configuration
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display authentication mac-move configuration command to
view the MAC address migration configuration. The configuration includes the
number of times that MAC address migration users are allowed to migrate their
MAC addresses 60s before they enter the quiet state, the period that MAC address
migration users stay in the quiet state, the interval at which a device detects users'
online status before user MAC address migration, and the number of detections
before user MAC address migration.
Example
# Display the MAC address migration configuration.
<HUAWEI> display authentication mac-move configuration
Mac-move vlan config:all
Mac-move quiet times:1
Mac-move quiet period(s):120
Mac-move quiet log:ENABLE
Mac-move quiet user alarm:ENABLE
Mac-move quiet user alarm lower percentage(%):
50
Mac-move quiet user alarm upper percentage(%):100
Mac-move detect:DISABLE
Mac-move detect retry-interval(s):3
Mac-move detect retry-time:1
Mac-move quiet user alarm lower Lower alarm threshold for the
percentage(%) percentage of MAC address migration
users in quiet state.
For details, see the 13.4.28
authentication mac-move quiet-
user-alarm percentage command.
Item Description
Mac-move quiet user alarm upper Upper alarm threshold for the
percentage(%) percentage of MAC address migration
users in quiet state.
For details, see the 13.4.28
authentication mac-move quiet-
user-alarm percentage command.
Format
display authentication mac-move quiet-user { all | mac-address mac-address }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Run this command to view information about MAC address migration users in
quiet state.
Example
# Display information about all MAC address migration users in quiet state.
<HUAWEI> display authentication mac-move quiet-user all
Quiet MAC Information
-------------------------------------------------------------------------------
Quiet MAC Quiet Remain Time(Sec)
-------------------------------------------------------------------------------
0001-0002-0003 143
-------------------------------------------------------------------------------
1 quiet MAC found, 1 printed.
Item Description
Function
The display authentication interface command displays the configuration of the
NAC authentication mode on an interface.
Format
display authentication interface interface-type interface-number
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After configuring the NAC authentication mode, you can run this command to
check the configuration.
Example
# Display the configuration of the NAC authentication mode on GE0/0/1.
<HUAWEI> display authentication interface gigabitethernet 0/0/1
Authentication profile: p1
Authentication access-point: Enable
Authentication access-point max-user: 10
Port authentication order:
MAC
DOT1X
WEB
Format
display authentication mode
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display authentication mode command to view the current NAC
configuration mode.
Example
# Display the current NAC configuration mode and the mode after restart.
<HUAWEI> display authentication mode
Current authentication mode is unified-mode
Next authentication mode is unified-mode
Item Description
Format
display authentication-profile configuration [ name authentication-profile-
name ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After configuring an authentication profile, you can run this command to check
whether the configuration is correct.
NOTE
Example
# Display all the authentication profiles configured on the device.
<HUAWEI> display authentication-profile configuration
-------------------------------------------------------------------------------
ID Auth-profile name
-------------------------------------------------------------------------------
0 default_authen_profile
1 dot1x_authen_profile
2 mac_authen_profile
3 portal_authen_profile
4 dot1xmac_authen_profile
5 multi_authen_profile
-------------------------------------------------------------------------------
Total 6, printed 6
Item Description
Item Description
Item Description
Auth-fail aging Time Aging time for entries of the users who
fail to be authenticated.
To configure the aging time, run the
13.4.31 authentication timer authen-
fail-aging command.
Item Description
Item Description
Linkdown offline delay time User logout delay when an interface link
is faulty.
To configure the delay, run the 13.4.123
link-down offline delay command.
Function
The display device-profile command displays the configuration of a specified
terminal type identification profile or all terminal type identification profiles.
NOTE
Format
display device-profile { all | profile-name profile-name }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After configuring terminal type identification, you can run the display device-
profile command to view the terminal type identification profile configuration,
including the profile name, terminal type identifier, and ACL rule.
Example
# Display summary of all terminal type identification profiles.
<HUAWEI> display device-profile all
----------------------------------------------------------------------------
Name Device type Rule num
test huawei 1
----------------------------------------------------------------------------
Total count : 1
# Display detailed information about the terminal type identification profile test.
<HUAWEI> display device-profile profile-name test
----------------------------------------------------------------------------
Name : test
Device type : huawei
State : disabled
Rule :
rule 1 mac 0006-0045-0078 mask 12
Match :
if-match rule id 1
----------------------------------------------------------------------------
Item Description
Format
display dot1x [ statistics ] [ interface { interface-type interface-number1 [ to
interface-number2 ] } &<1-10> ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run the display dot1x command to view configuration results of all
configuration commands in 802.1X authentication and statistics about 802.1X
packets.
The command output helps you to check whether the current 802.1X
authentication configuration is correct and isolate faults accordingly.
Follow-up Procedure
The display dot1x command displays the statistics on 802.1X packets. You can
locate the fault according to the packet statistics. When the fault is rectified, run
the reset dot1x statistics command to clear the packet statistics. After a period of
time, run the display dot1x command again to check the packet statistics. If no
error packet is found, the fault is rectified.
Example
# Display 802.1X authentication information.
<HUAWEI> display dot1x
Max users: 1024
Current users: 0
Global default domain is huawei
Quiet function is Enabled
Item Description
Item Description
Item Description
EAPOL Start Packets Number of globally received and sent EAPOL Start
packets.
Function
The display dot1x-access-profile configuration command displays the
configuration of an 802.1X access profile.
Format
display dot1x-access-profile configuration [ name access-profile-name ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After configuring an 802.1X access profile, you can run this command to check
whether the configuration is correct.
NOTE
The name of the compatibility profile converted after an upgrade begins with the at sign (@)
and the profile is not counted in the configuration specification.
Example
# Display all the 802.1X access profiles configured on the device.
<HUAWEI> display dot1x-access-profile configuration
-------------------------------------------------------------------------------
ID Dot1x-Access-Profile Name
-------------------------------------------------------------------------------
0 dot1x_access_profile
1 d1
2 d2
3 d3
4 d4
-------------------------------------------------------------------------------
Total: 5 printed: 5.
Item Description
Item Description
Item Description
Format
display dot1x quiet-user { all | mac-address mac-address }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view information about 802.1X authentication users
who are quieted.
Example
# Display information about all 802.1X authentication users who are quieted.
<HUAWEI> display dot1x quiet-user all
-------------------------------------------------------------------------------
MacAddress Quiet Remain Time(Sec)
-------------------------------------------------------------------------------
0001-0002-0003 50
-------------------------------------------------------------------------------
1 silent mac address(es) found, 1 printed.
Table 13-50 Description of the display dot1x quiet-user all command output
Item Description
Function
The display free-rule command displays whether an authentication-free rule
defined by ACL is delivered.
Format
display free-rule
Parameters
None.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display free-rule command to view the delivery status of an
authentication-free rule defined by ACL.
Example
# Display whether an authentication-free rule defined by ACL is delivered.
<HUAWEI> display free-rule
------------------------------------------------------------------------------
Slot-ID Acl-ID Status
------------------------------------------------------------------------------
0 6000 SUCCESS
------------------------------------------------------------------------------
Total 1 free-rule(s)
Item Description
Format
display free-rule-template configuration [ name free-rule-name ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After configuring an authentication-free rule profile, you can run this command to
check whether the configuration is correct.
Example
# Display all the authentication-free rule profiles configured on the device.
<HUAWEI> display free-rule-template configuration
-------------------------------------------------------------------------------
ID Free-rule-template Name
-------------------------------------------------------------------------------
0 default_free_rule
-------------------------------------------------------------------------------
Total: 1 printed: 1.
Format
display mac-address authen [ interface-type interface-number | vlan vlan-id ] *
[ verbose ]
Parameters
Parameter Description Value
vlan vlan-id Displays MAC address entries in a specified The value is an
VLAN. integer that
ranges from 1
If no VLAN is specified, MAC address entries to 4094.
in all VLANs of the device are displayed.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
Precautions
If there are a lot of authen MAC address entries, you can specify a VLAN or use a
pipe operator (|) to filter the output information. Otherwise, the following
problems may occur due to excessive output information:
● The displayed information is refreshed repeatedly on the terminal screen and
the administrator cannot obtain the required information.
● The device traverses and retrieves information for a long time, and does not
respond to any request.
Example
# Display all authen MAC address entries in the system.
<HUAWEI> display mac-address authen
-------------------------------------------------------------------------------
MAC Address VLAN/VSI/BD Learned-From Type
-------------------------------------------------------------------------------
0000-0000-0100 3000/-/- GE0/0/1 authen
0000-0000-0400 3000/-/- GE0/0/1 authen
0000-0000-0200 3000/-/- GE0/0/1 authen
-------------------------------------------------------------------------------
Total items displayed = 3
Item Description
Total items Total number of MAC address entries that match the filter
displayed condition.
Format
display mac-address pre-authen [ interface-type interface-number | vlan vlan-
id ] * [ verbose ]
Parameters
Parameter Description Value
vlan vlan-id Displays MAC address entries in a specified The value is an
VLAN. integer that
ranges from 1
If no VLAN is specified, MAC address entries to 4094.
in all VLANs of the device are displayed.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run this command to check the existing MAC address entries of the pre-
connection type to obtain access information about pre-connection users and
locate faults.
Precautions
If there are a lot of pre-authen MAC address entries, you can specify a VLAN or
use a pipe operator (|) to filter the output information. Otherwise, the following
problems may occur due to excessive output information:
Example
# Display all pre-authen MAC address entries in the system.
<HUAWEI> display mac-address pre-authen
-------------------------------------------------------------------------------
MAC Address VLAN/VSI/BD Learned-From Type
-------------------------------------------------------------------------------
0000-0000-0100 3000/-/- GE0/0/1 pre-authen
0000-0000-0400 3000/-/- GE0/0/1 pre-authen
0000-0000-0200 3000/-/- GE0/0/1 pre-authen
-------------------------------------------------------------------------------
Total items displayed = 3
Total items Total number of MAC address entries that match the filter
displayed condition.
Format
display mac-access-profile configuration [ name access-profile-name ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After configuring a MAC access profile, you can run this command to check
whether the configuration is correct.
NOTE
The name of the compatibility profile converted after an upgrade begins with the at sign (@)
and the profile is not counted in the configuration specification.
Example
# Display all the MAC access profiles configured on the device.
<HUAWEI> display mac-access-profile configuration
-------------------------------------------------------------------------------
ID Mac-Access-Profile Name
-------------------------------------------------------------------------------
0 mac_access_profile
1 m1
2 m2
3 m3
4 m4
-------------------------------------------------------------------------------
Total: 5 printed: 5.
# Display the configuration of the MAC access profile m1 (the MAC address
authentication user configures a password).
<HUAWEI> display mac-access-profile configuration name m1
Profile Name : m1
Username format : fixed username: a1
Password type : cipher
Re-authen : Disable
Trigger condition : arp dhcp nd dhcpv6
Offline dhcp-release : Disable
Re-authen dhcp-renew : Disable
Reauthen Period : 1800s
Bound authentication profile : -
# Display the configuration of the MAC access profile m2 (the MAC address
authentication user does not configure a password).
<HUAWEI> display mac-access-profile configuration name m2
Profile Name : m2
Username format : fixed username: a1
Password : not configured
Re-authen : Disable
Trigger condition : arp dhcp nd dhcpv6
Offline dhcp-release : Disable
Re-authen dhcp-renew : Disable
Reauthen Period : 1800s
Bound authentication profile : -
Item Description
Item Description
Item Description
Format
display mac-authen [ interface { interface-type interface-number1 [ to interface-
number2 ] } &<1-10> | configuration ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run the display mac-authen command to view configuration results of all
configuration commands in MAC address authentication. The command output
helps you to check whether the MAC address authentication configuration is
correct and isolate faults accordingly.
Follow-up Procedure
You can locate the fault according to the packet statistics that is displayed using
the display mac-authen command. When the fault is rectified, run the reset mac-
authen statistics command to clear the packet statistics. After a period of time,
run the display mac-authen command again to check the packet statistics. If no
error packet is found, the fault is rectified.
Example
# Display the configuration of MAC address authentication.
Item Description
Item Description
Item Description
Format
display mac-authen quiet-user { all | mac-address mac-address }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view information about MAC address authentication
users who are quieted.
Example
# Display information about all MAC address authentication users who are
quieted.
<HUAWEI> display mac-authen quiet-user all
-------------------------------------------------------------------------------
MacAddress Quiet Remain Time(Sec)
-------------------------------------------------------------------------------
0001-0002-0003 50
-------------------------------------------------------------------------------
1 silent mac address(es) found, 1 printed.
Item Description
Format
display portal [ interface interface-type interface-number | configuration ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display portal command to view the Portal authentication
configuration and check whether the configuration is correct.
Example
# Display the Portal authentication configuration.
Item Description
Item Description
Format
display portal local-server connect [ user-ip ip-address ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display portal local-server connect command to check the
authentication mode and status of users to be authenticated on a built-in Portal
server.
Example
# Display the connection status of the user with the IP address 10.1.1.10 on a
built-in Portal server.
<HUAWEI> display portal local-server connect user-ip 10.1.1.10
-----------------------------------------------------------------------------------------
CID IP Address AuthMode State Session-timeout(hours)
-----------------------------------------------------------------------------------------
1 10.1.1.10 CHAP ONLINE 8
------------------------------------------------------------------------------------------
Item Description
Function
The display portal local-server command displays the configurations of a built-in
Portal server.
Format
display portal local-server
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After configuring the built-in Portal authentication, run this command to view the
configurations of a built-in Portal server.
Example
# Display the configurations of a built-in Portal server.
<HUAWEI> display portal local-server
Portal local-server config:
server status : disable
Heartbeat-check status : auto
Heartbeat-timeout value : 60(s)
server ip : 10.1.1.1
authentication method : chap
protocol :-
https ssl-policy :-
server port :0
session-timeout : 8(h)
syslog-limit : enable
syslog-limit period : 300(s)
server pagename :-
server page-text :-
server policy-text :-
server background-image : default-image0
server background-color :-
server logo :-
server ad-image :-
Item Description
Item Description
Format
display portal local-server page-information
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display portal local-server page-information command to
check the page files loaded to the memory of a built-in Portal server.
Example
# Display the page files loaded to the memory of a built-in Portal server.
<HUAWEI> display portal local-server page-information
--------------------------------------------------------------------------------
Number of backup pages:35
Size of backup pages:94438 byte
--------------------------------------------------------------------------------
Name:/logout_success.html
Size:4042 byte
Last-Modified-Time:2011-12-16 20:24:46
--------------------------------------------------------------------------------
Related Topics
13.4.152 portal local-server load
Format
display portal-access-profile configuration [ name access-profile-name ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After configuring a Portal access profile, you can run this command to check
whether the configuration is correct.
NOTE
The name of the compatibility profile converted after an upgrade begins with the at sign (@)
and the profile is not counted in the configuration specification.
Example
# Display all the Portal access profiles configured on the device.
<HUAWEI> display portal-access-profile configuration
-------------------------------------------------------------------------------
ID Portal-access-profile Name
-------------------------------------------------------------------------------
0 portal_access_profile
1 p1
2 p2
-------------------------------------------------------------------------------
Total: 3 printed: 3.
Item Description
Item Description
Function
The display portal quiet-user command displays information about Portal
authentication users in quiet state.
Format
display portal quiet-user { all | user-ip ip-address | server-ip ip-address }
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After the quiet timer is enabled, you can run the display portal quiet-user
command to view information about Portal authentication users in quiet state.
Example
# Display information about all Portal authentication users in quiet state.
<HUAWEI> display portal quiet-user all
Quiet IP information
-------------------------------------------------------------------------------------
Quiet ip Quiet Remain Time(Sec)
------------------------------------------------------------------------------------
192.168.1.1 10
192.168.1.2 20
------------------------------------------------------------------------------------
2 quiet IP found, 2 printed.
# Display information about all the users in quiet state authenticated by the
Portal authentication server with IP address 192.168.2.1.
<HUAWEI> display portal quiet-user server-ip 192.168.2.1
Quiet IP information
-------------------------------------------------------------------------------------
Quiet ip Quiet Remain Time(Sec)
------------------------------------------------------------------------------------
192.168.1.3 10
192.168.1.4 20
------------------------------------------------------------------------------------
2 quiet IP found, 2 printed.
Item Description
Item Description
Format
display portal url-encode configuration
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After configuring URL encoding and decoding, you can run the display portal url-
encode configuration command to check the configuration.
Example
# Display the configuration of URL encoding and decoding.
<HUAWEI> display portal url-encode configuration
Portal URL Encode : Disable
Related Topics
13.4.167 portal url-encode enable
Format
display portal user-logout [ ip-address ip-address [ vpn-instance vpn-instance-
name ] ]
NOTE
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After a Portal authentication user goes offline, the device sends an offline request
packet to the Portal server. If the device does not receive an ACK packet from the
Portal server, it records a temporary logout entry of the user. You can run the
display portal user-logout command to check temporary logout entries of Portal
authentication users.
Example
# Display the temporary logout entries of all Portal authentication users.
<HUAWEI> display portal user-logout
--------------------------------------------------------------
UserIP Vrf Resend Times TableID
--------------------------------------------------------------
192.168.111.100 1 3 0
--------------------------------------------------------------
Total: 1, printed: 1
Item Description
Function
The display server-detect state command displays the status of a Portal server.
Format
display server-detect state [ web-auth-server server-name ]
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
When an external Portal server is used for Portal authentication, you can run the
display server-detect state command to check information about the Portal
server status.
Example
# Display information about the Portal server status configured in the Portal
server profile abc.
<HUAWEI> display server-detect state web-auth-server abc
Web-auth-server : abc
Total-servers : 4
Live-servers : 1
Critical-num : 0
Status : Normal
Ip-address Status
192.168.2.1 UP
192.168.2.2 DOWN
192.168.2.3 DOWN
192.168.2.4 DOWN
Related Topics
13.4.181 server-ip (Portal server profile view)
13.4.180 server-detect
Format
display static-user [ domain-name domain-name | interface interface-type
interface-number | ip-address start-ip-address [ end-ip-address ] | vpn-instance
vpn-instance-name ] *
NOTE
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After a static user is configured, you can run the display static-user command to
view the static user information.
Example
# Display information about all static users configured.
<HUAWEI> display static-user
IP-address Interface MAC-address VPN
-------------------------------------------------------------------------------
10.1.1.6 GE0/0/1 0001-0001-0001 -
10.1.1.7 GE0/0/1 0001-0001-0001 -
10.1.1.8 GE0/0/1 0001-0001-0001 -
10.1.1.10 - 0002-0002-0002 -
10.1.1.11 - 0002-0002-0002 -
10.1.1.12 - 0002-0002-0002 -
-------------------------------------------------------------------------------
Total item(s) number= 6, displayed number= 6
Total item(s) number= m, displayed The total number of entries is m and the
number= n number of displayed entries is n.
Related Topics
13.4.185 static-user
13.4.187 static-user username format-include
13.4.186 static-user password
Function
The display ucl-group all command displays information about all UCL groups
that are created.
NOTE
This command is supported only by the S5720EI, S5720HI, S6720EI, and S6720S-EI.
Format
display ucl-group all
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After creating UCL groups using the 13.4.195 ucl-group command, you can run
the display ucl-group all command to check information about the UCL groups.
Example
# Display information about all UCL groups.
<HUAWEI> display ucl-group all
ID UCL group name
--------------------------------------------------------------------------------
10 huawei
--------------------------------------------------------------------------------
Total : 1
Item Description
NOTE
This command is supported only by the S5720EI, S5720HI, S6720EI, and S6720S-EI.
Format
display ucl-group ip ip-address { mask-length | ip-mask }
display ucl-group ip { group-index | name group-name | static | local-access-
user | all } [ verbose ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can view UCL groups' IP addresses that are manually added (using the
13.4.194 ucl-group ip command) and dynamically generated when users go
online and are granted UCL groups. When a user goes online successfully, the
device grants a UCL group to the user and adds the user's IP address (with a 32-
bit mask) to the UCL group. When the user goes offline or the user's IP address
changes, the device deletes the corresponding IP address from the UCL group.
Example
# Display IP address information of all UCL groups.
<HUAWEI> display ucl-group ip all
S : static L : local-access-user
IP/Mask ID UCL group name Type
--------------------------------------------------------------------------------
10.9.9.4/32 1 g1 S
10.10.0.0/16 2 g2 S
10.9.9.6/32 1 g1 L
--------------------------------------------------------------------------------
Total : 3 Static : 2 Local-access-user : 1
IP/Mask : 10.10.0.0/16
UCL group ID :2
UCL group name : g2
Type : static
Status on slot 0 : Success
--------------------------------------------------------------------------------
Total : 2 Static : 2 Local-access-user : 0
Item Description
Function
The display url-template command displays information about URL templates.
Format
display url-template { all | name template-name }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After a URL template is configured, run the display url-template command to
view information about the URL template.
Example
# Display information about all configured URL templates.
<HUAWEI> display url-template all
-------------------------------------------------------------------------------
Name URL Start Assignment Isolate
Number Mark Mark Mark
-------------------------------------------------------------------------------
huawei 0 ? = &
huawei2 0 ? = &
huawei3 0 ? = &
-------------------------------------------------------------------------------
Total 3
AC IP :
AC MAC :
AP IP :
AP MAC :
SSID :
User MAC :
Redirect URL :
User IP address :
Sysname :
Delimiter :
Format :
Login URL Key : logiurl
Login URL : http:\\huawei.com
Item Description
Item Description
Item Description
Format
display snmp-agent trap feature-name mid_aaa all
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After enabling the trap function for the AAA module, you can run this command
to check the status of all traps on the AAA module. To enable the trap function for
the AAA module, run the snmp-agent trap enable feature-name mid_aaa
command.
Prerequisites
The SNMP function has been enabled on the device. For details, see snmp-agent.
Example
# Display the status of all traps on the AAA module.
<HUAWEI> display snmp-agent trap feature-name mid_aaa all
------------------------------------------------------------------------------
Feature name: MID_AAA
Trap number : 2
------------------------------------------------------------------------------
Trap name Default switch status Current switch status
hwMacMovedQuietMaxUserAlarm on on
hwMacMovedQuietUserClearAlarm on on
Item Description
Related Topics
13.4.188 snmp-agent trap enable feature-name mid_aaa
Format
display snmp-agent trap feature-name mid_eapol all
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After enabling the trap function for the DOT1X module, you can run this
command to check the status of all traps on the DOT1X module. To enable the
trap function for the DOT1X module, run the snmp-agent trap enable feature-
name mid_eapol command.
Prerequisites
The SNMP function has been enabled on the device. For details, see snmp-agent.
Example
# Display the status of all traps on the DOT1X module.
<HUAWEI> display snmp-agent trap feature-name mid_eapol all
------------------------------------------------------------------------------
Feature name: MID_EAPOL
Trap number : 2
------------------------------------------------------------------------------
Trap name Default switch status Current switch status
hwSrvcfgEapMaxUserAlarm on on
hwMacAuthenMaxUserAlarm on on
Item Description
Related Topics
13.4.189 snmp-agent trap enable feature-name mid_eapol
Format
display snmp-agent trap feature-name mid_web all
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After enabling the trap function for the web authentication module, you can run
this command to check the status of all traps on the web authentication module.
To enable the trap function for the web authentication module, run the snmp-
agent trap enable feature-name mid_web command.
Prerequisites
The SNMP function has been enabled on the device. For details, see snmp-agent.
Example
# Display the status of all traps on the web authentication module.
<HUAWEI> display snmp-agent trap feature-name mid_web all
------------------------------------------------------------------------------
Feature name: MID_WEB
Trap number : 4
------------------------------------------------------------------------------
Trap name Default switch status Current switch status
hwPortalServerUp on on
hwPortalServerDown on on
hwPortalMaxUserAlarm on on
hwPortalUserClearAlarm on on
Item Description
Related Topics
13.4.190 snmp-agent trap enable feature-name mid_web
Format
display web-auth-server configuration
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After the Portal server template is configured, the display web-auth-server
configuration displays the Portal server configuration.
Example
# Display the Portal server configuration.
<HUAWEI> display web-auth-server configuration
Listening port : 2000
Portal : version 1, version 2
Include reply message : enabled
-------------------------------------------------------------------------------
Enabled protocol : https
Listening port : 8443
SSL policy : default_policy
-------------------------------------------------------------------------------
Protocol : http
Http Get-method : disable
Password Encrypt : none
Cmd ParseKey : cmd
Username ParseKey : username
Password ParseKey : password
MAC Address ParseKey : macaddress
IP Address ParseKey : ipaddress
Initial URL ParseKey : initurl
Login Cmd : login
Logout Cmd : logout
Login Success
Reply Type : redirect initial URL
Redirect URL :
Message : LoginSuccess!
Login Fail
Reply Type : redirect login URL
Redirect URL :
Message : LoginFail!
Logout Success
Reply Type : message
Redirect URL :
Message : LogoutSuccess!
Logout Fail
Reply Type : message
Redirect URL :
Message : LogoutFail!
-------------------------------------------------------------------------------
1 Web authentication server(s) in total
Item Description
Include reply message Whether the packets sent from the device
to the Portal server contain
authentication responses.
● enabled
● disabled
To enable the device to transparently
transmit authentication responses of
users sent by the authentication server to
the Portal server, run the 13.4.210 web-
auth-server reply-message command.
Item Description
Item Description
Item Description
Item Description
Item Description
Format
domain domain-name mac-authen force mac-address mac-address mask mask
undo domain domain-name mac-authen force mac-address mac-address
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can configure a forcible domain for MAC address authentication users within
a specified MAC address range in the system view.
Prerequisites
A domain has been created using the 13.1.47 domain (AAA view) command.
Precautions
The priorities of the forcible domain, domain carried in the user name, and default
domain in different views are as follows in descending order: forcible domain with
a specified authentication mode in an authentication profile > forcible domain in
an authentication profile > authentication domain carried in the user name >
default domain with a specified authentication mode in an authentication profile
> default domain in an authentication profile > global default domain. Note that a
forcible domain specified for MAC address authentication users within a MAC
address range has the highest priority and takes precedence over that configured
in an authentication profile.
This function takes effect only for users who go online after this function is
successfully configured.
Example
# In the system view, configure the forcible domain huawei for MAC address
authentication users within the MAC address range specified using MAC address
E024-7F95-7231 and mask FFFF-FFFF-FF00.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] domain huawei
[HUAWEI-aaa-domain-huawei] quit
[HUAWEI-aaa] quit
[HUAWEI] domain huawei mac-authen force mac-address e024-7f95-7231 mask ffff-ffff-ff00
Format
dot1x authentication-method { chap | pap | eap }
undo dot1x authentication-method
Parameters
Parameter Description Value
Views
802.1X access profile view
Default Level
2: Configuration level
Usage Guidelines
During 802.1X authentication, users exchange authentication information with the
device using EAP packets. The device uses two modes to exchange authentication
information with the RADIUS server.
● EAP termination: The device directly parses EAP packets, encapsulates user
authentication information into a RADIUS packet, and sends the packet to the
RADIUS server for authentication. EAP termination is classified into PAP or
CHAP authentication.
– PAP: The device arranges the MAC address, shared key, and random value
in sequence, performs hash processing on them using the MD5 algorithm,
and encapsulates the hash result into the User-Password attribute.
– CHAP: The device arranges the CHAP ID, MAC address, and random value
in sequence, performs hash processing on them using the MD5 algorithm,
and encapsulates the hash result into the CHAP-Password and CHAP-
Challenge attributes.
● EAP relay (specified by eap): The device encapsulates EAP packets into
RADIUS packets and sends the RADIUS packets to the RADIUS server. The
device does not parse the received EAP packets but encapsulates them into
RADIUS packets. This mechanism is called EAP over Radius (EAPoR).
The processing capability of the RADIUS server determines whether EAP
termination or EAP relay is used. If the RADIUS server has a higher processing
capability and can parse a large number of EAP packets before authentication, the
EAP relay mode is recommended. If the RADIUS server has a processing capability
not good enough to parse a large number of EAP packets and complete
authentication, the EAP termination mode is recommended and the device parses
EAP packets for the RADIUS server. When the authentication packet processing
method is configured, ensure that the client and server both support this method;
otherwise, the users cannot pass authentication.
NOTE
● The EAP relay can be configured for 802.1X users only when RADIUS authentication is
used.
● If AAA local authentication is used, the authentication mode for 802.1X users can only
be set to EAP termination.
● Because mobile phones do not support EAP termination mode (PAP and CHAP), the
802.1X authentication + local authentication mode cannot be configured for mobile
phones. Terminals such as laptop computers support EAP termination mode only after
having third-party clients installed.
● If the 802.1X client uses the MD5 encryption mode, the user authentication mode on
the device can be set to EAP or CHAP; if the 802.1X client uses the PEAP authentication
mode, the authentication mode on the device can be set to EAP.
● In a wireless access scenario, if WPA or WPA2 authentication mode is configured in the
security policy profile, 802.1X authentication does not support pre-authentication
domain-based authorization.
● If an interface has online 802.1X users and the authentication mode is changed between
EAP termination and EAP relay in the 802.1X access profile bound to the interface, the
online 802.1X users will be logged out. If the authentication mode is changed between
CHAP and PAP in EAP termination mode, the online 802.1X users will not be logged out.
Example
# In the 802.1X access profile d1, configure the device to use PAP authentication
for 802.1X users.
<HUAWEI> system-view
[HUAWEI] dot1x-access-profile name d1
[HUAWEI-dot1x-access-profile-d1] dot1x authentication-method pap
Related Topics
13.4.64 display dot1x-access-profile configuration
Function
The dot1x eap-notify-packet command configures the device to send EAP
packets with a code number to 802.1X users.
By default, the device does not send EAP packets with a code number to users.
Format
dot1x eap-notify-packet eap-code code-number data-type type-number
Parameters
Parameter Description Value
Views
802.1X access profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a non-Huawei device used as the RADIUS server sends RADIUS packets with
attribute 61, EAP packet code number 0xa (hexadecimal notation, 10 in decimal
notation), and data type being 0x19 (hexadecimal notation, 25 in decimal
notation) to the device, run the dot1x eap-notify-packet command on the device
so that the device can send EAP packets with code number 0xa and data type
0x19 to users. If the dot1x eap-notify-packet command is not executed, the
device does not process EAP packets of this type and users are disconnected.
Precautions
The device can only send EAP packets with code number 10 and data type 25.
Example
# In the 802.1X access profile d1, configure the device to send EAP packets with
code number 10 and data type 25 to users.
<HUAWEI> system-view
[HUAWEI] dot1x-access-profile name d1
[HUAWEI-dot1x-access-profile-d1] dot1x eap-notify-packet eap-code 10 data-type 25
The undo dot1x handshake command disables the device from sending
handshake packets to online 802.1X users.
By default, the device handshake function is disabled for online 802.1X users.
Format
dot1x handshake
undo dot1x handshake
Parameters
None
Views
802.1X access profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To check whether an 802.1X user is online in real time, run the 13.4.13
authentication handshake command to enable the device to send handshake
packets to the 802.1X user. If some clients support handshake with online 802.1X
users, run the dot1x handshake command to enable handshake with online
802.1X users. Then the device sends EAP handshake request packets to the user. If
the user sends a response packet within the handshake interval (configured using
the 13.4.103 dot1x timer command), the device considers that the user is online.
If the user does not send any response packet within the interval, the device
considers that the user is offline.
Precautions
Currently, most clients do not support this function, for example, the Windows
built-in client, AnyConnect client, and iOS built-in client. If a client does not
support the handshake function, the device will not receive handshake response
packets within the handshake interval and considers that the user is offline.
Therefore, you need to disable the device from sending handshake packets to an
online 802.1X user when the user's client does not support the handshake
function.
After the dot1x handshake command is run, the 13.4.13 authentication
handshake command does not take effect.
This function takes effect only for the wired users.
Example
# In the 802.1X access profile d1, enable the device to send handshake packets to
online 802.1X users.
<HUAWEI> system-view
[HUAWEI] dot1x-access-profile name d1
[HUAWEI-dot1x-access-profile-d1] dot1x handshake
Format
dot1x handshake packet-type { request-identity | srp-sha1-part2 }
undo dot1x handshake packet-type
Parameters
Parameter Description Value
request-identity Indicates that the type of 802.1X authentication -
handshake packets is request-identity.
srp-sha1-part2 Indicates that the type of 802.1X authentication -
handshake packets is srp-sha1-part2.
Views
802.1X access profile view
Default Level
2: Configuration level
Usage Guidelines
During 802.1X authentication, different vendors' devices support different
handshake packet types. By default, the device uses 802.1X authentication
handshake packets of the request-identity type. If a device connected to the
switch uses the 802.1X authentication handshake packets of the srp-sha1-part2
type, run the dot1x handshake packet-type command to set the type of 802.1X
authentication handshake packets to srp-sha1-part2.
NOTE
The dot1x handshake packet-type command takes effect only for users that log in after
the command is run.
This function takes effect only for the wired users.
Example
# In the 802.1X access profile d1, set the type of 802.1X authentication handshake
packets to srp-sha1-part2.
<HUAWEI> system-view
[HUAWEI] dot1x-access-profile name d1
[HUAWEI-dot1x-access-profile-d1] dot1x handshake packet-type srp-sha1-part2
Function
The dot1x mc-trigger command enables multicast-triggered 802.1X
authentication.
Format
dot1x mc-trigger
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
If a client (for example, the built-in 802.1X client of the Windows operating
system) cannot send an EAPOL-Start packet to perform 802.1X authentication, you
can enable multicast-triggered 802.1X authentication. After that, the device
multicasts an EAP-Request/Identity packet to the client to trigger authentication.
Example
# Enable multicast-triggered 802.1X authentication.
<HUAWEI> system-view
[HUAWEI] dot1x mc-trigger
Function
The dot1x mc-trigger port-up-send enable command enables the function of
triggering 802.1X authentication through multicast packets immediately after an
interface goes Up.
The undo dot1x mc-trigger port-up-send enable command disables the function
of triggering 802.1X authentication through multicast packets immediately after
an interface goes Up.
Format
dot1x mc-trigger port-up-send enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
By default, the device periodically multicasts EAP-Request/Identity packets to
clients so that the clients are triggered to send EAPOL-Start packets for 802.1X
authentication. If the device interface connecting to a client changes from Down
to Up, the client needs to send EAPOL-Start packets again for 802.1X
authentication, which takes a long time. You can run the dot1x mc-trigger port-
up-send enable command on the device to enable the device interface to
multicast EAP-Request/Identity packets to the client to trigger 802.1X
authentication immediately after the interface goes Up. This configuration
shortens the re-authentication time.
Example
# Enable the function of triggering 802.1X authentication through multicast
packets immediately after an interface goes Up.
<HUAWEI> system-view
[HUAWEI] dot1x mc-trigger port-up-send enable
Format
dot1x port-control { auto | authorized-force | unauthorized-force }
undo dot1x port-control
Parameters
Parameter Description Value
Views
802.1X access profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The auto mode is recommended. Only authenticated users can access network
resources. To trust all users on an interface without authentication, configure the
authorized-force mode. To disable access rights of all users on an interface to
ensure security, configure the unauthorized-force mode.
Precautions
If 802.1X users on an interface have gone online, changing the authorization state
in the 802.1X access profile bound to the interface will make the online 802.1X
users go offline.
It is recommended that you set the authorization state of an interface in the early
stage of network deployment. When the network is running properly, run the cut
access-user command to disconnect all users from the interface before changing
the authorization state.
Example
# Configure the authorization state of an interface as unauthorized-force in
802.1X access profile d1.
<HUAWEI> system-view
[HUAWEI] dot1x-access-profile name d1
[HUAWEI-dot1x-access-profile-d1] dot1x port-control unauthorized-force
Related Topics
13.4.64 display dot1x-access-profile configuration
Function
The dot1x quiet-period command enables the quiet function for 802.1X
authentication users.
The undo dot1x quiet-period command disables the quiet function for 802.1X
authentication users.
Format
dot1x quiet-period
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After the quiet timer function is enabled, if the number of authentication failures
of an 802.1X user exceeds a specified value (set using the 13.4.99 dot1x quiet-
times command) within 60 seconds, the user enters a quiet period. During the
quiet period, the device discards the 802.1X authentication request packets from
the user. This prevents the impact on the system due to frequent user
authentication.
The value of the quiet timer is set using the 13.4.105 dot1x timer quiet-period
command. When the quiet timer expires, the device re-authenticates the user.
Example
# Enable the quiet timer.
<HUAWEI> system-view
[HUAWEI] dot1x quiet-period
Format
dot1x quiet-times fail-times
undo dot1x quiet-times
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After the quiet timer function of the device is enabled using the 13.4.98 dot1x
quiet-period command, if the number of authentication failures of an 802.1X user
exceeds the value that is set using the dot1x quiet-times command within 60
seconds, the user enters the quiet state. This prevents the impact on the system
due to frequent user authentication.
Example
# Set the maximum number of authentication failures within 60 seconds before
an 802.1X user enters the quiet state to 4.
<HUAWEI> system-view
[HUAWEI] dot1x quiet-times 4
Function
The dot1x reauthenticate mac-address command enables re-authentication for
an online 802.1X user with the specified MAC address.
Format
dot1x reauthenticate mac-address mac-address
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
For details, see dot1x reauthenticate.
Example
# Enable re-authentication for an 802.1X user with the MAC address of 00e0-
fc01-0005.
<HUAWEI> system-view
[HUAWEI] dot1x reauthenticate mac-address 00e0-fc01-0005
Function
The dot1x reauthenticate command configures re-authentication for online
802.1X authentication users.
Format
dot1x reauthenticate
Parameters
None
Views
802.1X access profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After modifying the authentication parameters of a user on the authentication
server, the administrator must re-authenticate the user in real time to ensure user
validity if the user has been online.
After the user goes online, the device saves authentication parameters of the user.
After re-authentication is configured for online 802.1X authentication users using
the dot1x reauthenticate command in the 802.1X access profile, the device
automatically sends the user authentication parameters in the 802.1X access
profile to the authentication server at an interval (specified using the 13.4.103
dot1x timer reauthenticate-period reauthenticate-period-value command) for
re-authentication. If the user authentication information on the authentication
server remains unchanged, the users are kept online. If the information has been
changed, the users are disconnected and need to be re-authenticated based on
the changed authentication parameters.
Precautions
After re-authentication is configured for online 802.1X authentication users, a
large number of 802.1X authentication logs are generated.
If the device is connected to a server for re-authentication and the server replies
with a re-authentication deny message that makes an online user go offline, it is
recommended that you locate the cause of the re-authentication failure on the
server or disable the re-authentication function on the device.
Example
# In the 802.1X access profile d1, configure re-authentication for online 802.1X
authentication users.
<HUAWEI> system-view
[HUAWEI] dot1x-access-profile name d1
[HUAWEI-dot1x-access-profile-d1] dot1x reauthenticate
Related Topics
13.4.64 display dot1x-access-profile configuration
Format
dot1x retry max-retry-value
Parameters
Parameter Description Value
Views
802.1X access profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If the device does not receive any response from a user within a specified time
after sending an authentication request or handshake packet to the user, the
device sends the authentication request or handshake packet again. If the
authentication request or handshake packet has been sent for the maximum
retransmission times and no response is received, the user authentication or
handshake fails. In this process, the total number of authentication requests or
handshake packets sent by the device is max-retry-value plus 1.
Precautions
Repeated authentication requests occupy a lot of system resources. When using
the dot1x retry command, you can set the maximum number of times according
to user requirements and device resources. The default value is recommended.
The following table lists the intervals at which the device retransmits different
types of packets and related commands.
Example
# In the 802.1X access profile d1, configure the number of times an authentication
request or handshake packet can be retransmitted to 802.1X users to 4.
<HUAWEI> system-view
[HUAWEI] dot1x-access-profile name d1
[HUAWEI-dot1x-access-profile-d1] dot1x retry 4
Related Topics
13.4.64 display dot1x-access-profile configuration
Format
dot1x timer { client-timeout client-timeout-value | reauthenticate-period
reauthenticate-period-value | handshake-period handshake-period-value | eth-
trunk-access handshake-period handshake-period-value }
undo dot1x timer { client-timeout | reauthenticate-period | handshake-period
| eth-trunk-access handshake-period }
Parameters
Parameter Description Value
Views
802.1X access profile view
Default Level
2: Configuration level
Usage Guidelines
During 802.1X authentication, multiple timers are started to implement proper
and orderly interactions between access users, access devices, and the
authentication server. You can change the values of timers by running the dot1x
timer command to adjust the interaction process. (The values of some timers
cannot be changed.) This command is necessary in special network environments.
It is recommended that you retain the default settings of the timers.
This command only sets the values of the timers. To enable the timers, perform
corresponding configurations or use default settings.
● The client authentication timeout timer and the interval for sending
authentication requests are enabled by default. You can run the 13.4.102
dot1x retry command to configure the number of retransmissions of
authentication request packets when the client authentication times out.
● The re-authentication timer for online 802.1X users is disabled by default. To
enable this timer, run the 13.4.101 dot1x reauthenticate command.
● The online 802.1X user handshake function is disabled by default. You can run
the 13.4.93 dot1x handshake command to enable the online 802.1X user
handshake function. The handshake function takes effect only for the wired
users.
NOTE
It is recommended that the re-authentication interval be set to the default value. If multiple
ACLs need to be delivered during user authorization, you are advised to disable the re-
authentication function or set a longer re-authentication interval to improve the device's
processing performance.
In remote authentication and authorization, if the re-authentication interval is set to a shorter
time, the CPU usage may be higher.
To reduce the impact on the device performance when many users exist, the user re-
authentication interval may be longer than the configured re-authentication interval.
Example
# In the 802.1X access profile d1, set the client authentication timeout interval to
90 seconds.
<HUAWEI> system-view
[HUAWEI] dot1x-access-profile name d1
[HUAWEI-dot1x-access-profile-d1] dot1x timer client-timeout 90
Related Topics
13.4.64 display dot1x-access-profile configuration
Function
The dot1x timer mac-bypass-delay command configures the 802.1X
authentication timeout timer after which MAC address authentication is
performed.
Format
dot1x timer mac-bypass-delay delay-time-value
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After MAC address bypass authentication is configured, the device performs
802.1X authentication first and starts the timer configured using the dot1x timer
mac-bypass-delay delay-time-value command. If 802.1X authentication is not
successful before the timer expires, the device performs MAC address
authentication on users. You can run the 13.4.102 dot1x retry max-retry-value
command to set the number of times an authentication request is retransmitted
to an 802.1X user. The retransmission interval is the integer part of the value
calculated using the following formula: delay-time-value/(max-retry-value + 1)
Example
# Configure the device to perform MAC address authentication if 802.1X
authentication is not successful within 60 seconds.
<HUAWEI> system-view
[HUAWEI] dot1x timer mac-bypass-delay 60
Format
dot1x timer quiet-period quiet-period-times
undo dot1x timer quiet-period
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
If an 802.1X authentication user fails to be authenticated consecutively within a
short period, the system is affected and a large number of duplicated
authentication failure logs are generated.
After the quiet function is enabled using the 13.4.98 dot1x quiet-period
command, if the number of times that an 802.1X user fails to be authenticated
within 60s exceeds the upper limit (configured using the 13.4.99 dot1x quiet-
times command), the device discards the user's 802.1X authentication request
packets for a period to avoid frequent authentication failures.
Example
# Set the quiet period to 100 seconds for 802.1X users who fail to be
authenticated.
<HUAWEI> system-view
[HUAWEI] dot1x timer quiet-period 100
Format
dot1x trigger dhcp-binding
undo dot1x trigger dhcp-binding
Parameters
None
Views
802.1X access profile view
Default Level
2: Configuration level
Usage Guidelines
Scenario
There are unauthorized users who modify their MAC addresses to those of
authorized users. After authorized users are connected through 802.1X
authentication, the unauthorized users can obtain the same identities as the
authorized users and connect to the network without authentication. This results
in security risks of authentication and accounting. After accessing the network,
unauthorized users can also initiate ARP spoofing attacks by sending bogus ARP
packets. In this case, the device records incorrect ARP entries, greatly affecting
normal communication between authorized users. To prevent the previous attacks,
configure IPSG and DAI. These two functions are implemented based on binding
tables. For static IP users, you can run the user-bind static command to configure
the static binding table. However, if there are many static IP users, it takes more
time to configure static binding entries one by one.
To reduce the workload, you can configure the device to automatically generate
the DHCP snooping binding table for static IP users. After the static IP users who
pass 802.1X authentication or are at the pre-authentication phase send EAP
packets to trigger generation of the user information table, the device
automatically generates the DHCP snooping binding table based on the MAC
address, IP address, and interface recorded in the table.
You can run the display dhcp snooping user-bind command to check the DHCP
snooping binding table that is generated by the device for static IP users who pass
802.1X authentication or are at the pre-authentication phase. The DHCP snooping
binding table generated using this function will be deleted after the users are
disconnected.
Follow-up Procedure
Configure IPSG and DAI after the DHCP snooping binding table is generated,
prevent attacks from unauthorized users.
● In the interface view, run the ip source check user-bind enable command to
enable IPSG.
● In the interface view, run the arp anti-attack check user-bind enable
command to enable DAI.
Precautions
● To make this function take effect, you must run the dhcp snooping enable
command on the interface to which the 802.1X access profile is bound to
enable the DHCP snooping function on the interface and globally.
● The EAP protocol does not specify a standard attribute to carry IP address
information. Therefore, if the EAP request packet sent by a static IP user does
not contain an IP address, the IP address information in the DHCP snooping
binding table is obtained from the user' first ARP request packet with the
same MAC address as the user information table after the user passes
authentication. On a network, unauthorized users may forge authorized users'
MAC addresses to initiate ARP snooping attacks to devices, and the DHCP
snooping binding table generated accordingly may be unreliable. Therefore,
the dot1x trigger dhcp-binding command is not recommended and you are
advised to run the user-bind static command to configure the static binding
table.
● For users who are assigned IP addresses using DHCP, you do not need to run
the dot1x trigger dhcp-binding command on the device. The DHCP snooping
binding table is generated through the DHCP snooping function.
● The IP address in the DHCP snooping binding table is extracted from the ARP
request packet (the first ARP request packet sent by the user after the user is
authenticated or in the pre-connection state that has the same MAC address
in the user information table). If the static IP address of a user is changed, the
user needs to be authenticated again.
Example
# In the 802.1X access profile d1, enable the device to automatically generate the
DHCP snooping binding table after static IP users pass 802.1X authentication or
when the users are at the pre-authentication phase.
<HUAWEI> system-view
[HUAWEI] dot1x-access-profile name d1
[HUAWEI-dot1x-access-profile-d1] dot1x trigger dhcp-binding
Format
dot1x timer tx-period tx-period-value
undo dot1x timer tx-period
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The device starts the tx-period timer in either of the following situations:
● When the client initiates authentication and MAC address bypass
authentication is not configured, the device sends a unicast Request/Identity
packet to the client and starts the tx-period timer. If the client does not
respond within the period set by the timer, the device retransmits the
authentication request.
● To authenticate the 802.1X clients that cannot initiate authentication, the
device periodically sends multicast Request/Identity packets through the
802.1X-enabled interface to the clients at the interval set by the tx-period
timer.
After MAC address bypass authentication is enabled on a device, the interval at
which the device sends unicast Request/Identity packets to clients is determined
Normally, it is recommended that you retain the default setting of the timer.
Example
# Set the interval at which the device sends authentication requests to 90 seconds.
<HUAWEI> system-view
[HUAWEI] dot1x timer tx-period 90
Format
dot1x unicast-trigger
Parameters
None
Views
802.1X access profile view
Default Level
2: Configuration level
Usage Guidelines
After the dot1x unicast-trigger command is used on the device, the device sends
a unicast packet to respond to the received ARP or DHCP Request packet from a
client. If the client does not respond within the timeout interval (set by the
13.4.103 dot1x timer client-timeout client-timeout-value command), the device
retransmits the unicast packet (the maximum of retransmission times is set by the
13.4.102 dot1x retry max-retry-value command). This function allows users to
use the 802.1X client provided by the operating system for authentication, helping
quickly deploy an 802.1X network.
After receiving a packet that triggers 802.1X authentication from a client, the
device sends a unicast packet to the client. For clients that cannot send packets to
trigger 802.1X authentication, configure multicast packets to trigger 802.1X
authentication.
Example
# In the 802.1X access profile d1, enable 802.1X authentication triggered by
unicast packets.
<HUAWEI> system-view
[HUAWEI] dot1x-access-profile name d1
[HUAWEI-dot1x-access-profile-d1] dot1x unicast-trigger
Format
dot1x url url-string
undo dot1x url
Parameters
Parameter Description Value
url-string Specifies the It is a string of 1 to 200 case-sensitive
redirect-to URL. characters that do not contain spaces and
question marks (?). When double quotation
marks are used around the string, spaces are
allowed in the string.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In the early stage of network deployment, 802.1X client deployment is difficult
with heavy workload. You can run the dot1x url command to set the redirect-to
URL to the 802.1X client download web page address. When a user attempts to
access a non-free IP subnet, the device redirects the user to the redirect-to URL
where the user can download and install the 802.1X client software.
Follow-up Procedure
Run the 13.4.113 free-rule command to configure a free IP subnet where the
redirect URL used in 802.1X authentication belongs.
Precautions
The device does not support the triggering of a redirect URL through HTTPS
packets.
Example
# Set the redirect-to URL in 802.1X authentication to http://www.***.com.cn.
<HUAWEI> system-view
[HUAWEI] dot1x url http://www.***.com.cn
Function
The dot1x-access-profile command binds an authentication profile to an 802.1X
access profile.
Format
dot1x-access-profile access-profile-name
undo dot1x-access-profile
Parameters
Parameter Description Value
Views
Authentication profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The authentication type used by an authentication profile is determined by the
access profile bound to the authentication profile. After being bound to an 802.1X
access profile, the authentication profile is enabled with 802.1X authentication.
After the authentication profile is applied to the interface or VAP profile, 802.1X
authentication can be performed on online users.
Prerequisites
An 802.1X access profile has been created using the 13.4.111 dot1x-access-
profile (system view) command.
Follow-up Procedure
Run the 13.4.42 authentication-profile (Interface view or VAP profile view)
command to apply the authentication profile to the interface or VAP profile.
Precautions
An authentication profile can be bound to only one 802.1X access profile.
Example
# Bind the authentication profile dot1x_authen_profile1 to the 802.1X access
profile dot1x_access_profile1.
<HUAWEI> system-view
[HUAWEI] dot1x-access-profile name dot1x_access_profile1
[HUAWEI-dot1x-access-profile-dot1x_access_profile1] quit
[HUAWEI] authentication-profile name dot1x_authen_profile1
[HUAWEI-authen-profile-dot1x_authen_profile1] dot1x-access-profile dot1x_access_profile1
Related Topics
13.4.61 display authentication-profile configuration
Format
dot1x-access-profile name access-profile-name
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The device uses 802.1X access profiles to uniformly manage all 802.1X users access
configurations. To perform 802.1X authentication for the users in the interface or
VAP profile, bind the authentication profile applied to the interface or VAP profile
to an 802.1X access profile.
Follow-up Procedure
Precautions
Example
# Create the 802.1X access profile named dot1x_access_profile1.
<HUAWEI> system-view
[HUAWEI] dot1x-access-profile name dot1x_access_profile1
Related Topics
13.4.64 display dot1x-access-profile configuration
NOTE
Format
enable
undo enable
Parameters
None
Views
Terminal type identification profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The terminal type identification profile takes effect immediately when terminal
type identification is enabled. The AC analyzes the terminal's MAC address, DHCP
Option, and UA information. If the information matches the rules configured in
the profile, the AC identifies the terminal type.
Prerequisite
A terminal type identifier has been configured using the 13.4.47 device-type
command.
Example
# Enable terminal type identification.
<HUAWEI> system-view
[HUAWEI] device-profile profile-name huawei
Related Topics
13.4.47 device-type
13.4.62 display device-profile
13.4.113 free-rule
Function
The free-rule command configures authentication-free rules for NAC
authentication users.
Format
Common authentication-free rule:
NOTE
Only the S5720EI, S5720HI, S6720EI, and S6720S-EI support the authentication-free rule defined
by ACL.
Parameters
Parameter Description Value
rule-id Specifies the number of an The value is an integer
authentication-free rule for NAC that ranges from 0 to
authentication users. 511.
mask mask-length Specifies the mask length of the The value is an integer
source or destination IP address that ranges from 1 to
depending on the keyword. 32.
mask ip-mask Specifies the mask of the source or The value is in dotted
destination IP address depending on decimal notation.
the keyword.
udp destination- Specifies the UDP destination port The value is an integer
port port number. that ranges from 1 to
65535.
acl-name acl- Specifies the name of an IPv4 ACL. The value must be an
name existing IPv4 ACL
name. The value of the
named ACL ranges
from 6000 to 6031.
Views
Authentication-free rule profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To meet basic network access requirements of users who have not passed
authentication, the users need to obtain some network access rights without
authentication, for example, download 802.1X client software and update the
antivirus database. After running the 13.4.115 free-rule-template (system view)
command to create an authentication-free rule profile, run the free-rule
command to configure authentication-free rules in the profile. The users then can
obtain some network access rights without authentication.
An authentication-free rule can be a common authentication-free rule or defined
by an ACL. A common authentication-free rule is determined by parameters such
as IP address, MAC address, interface, and VLAN. An authentication-free rule
defined by an ACL is determined by the ACL rule (configured using the rule
command). The destination IP address that users can access without
authentication can be specified in an authentication-free rule defined by either of
the two methods. In addition, the destination domain name that users can access
without authentication can be specified in an authentication-free rule defined by
an ACL.
Compared with the authentication-free rule defined by IP address, the one defined
by domain name is sometimes simple and convenient. For example, some
authentication users who do not have an authentication account must first log in
to the official website of a carrier and apply for a member account, or log in using
the account of a third party such as Twitter or Facebook. This requires that the
users can access specified websites before successful authentication. The domain
name of a website is easier to remember than the IP address; therefore, the
authentication-free rule defined by ACL can be configured to enable the users to
access the domain names of websites without authentication.
Prerequisites
To use the authentication-free rule defined by ACL: an ACL rule has been
configured using the rule command. This ACL rule can be based on an IP address
or a domain name. If the rule is defined by IP address, the source and destination
parameters can be configured; if the rule is defined by domain name, only the
destination parameter can be configured.
NOTE
If the user ACL is created using a name (specified by acl-name), a name-based ACL has been
created and the ACL number (6000-6031) has been specified using the acl name acl-name acl-
number command.
Follow-up Procedure
The domain name specified in an ACL only supports dynamic DNS resolution.
Therefore, when you define the authentication-free rule by domain name,
configure dynamic DNS resolution on the device and enable users to access the
DNS server without authentication. The steps are as follows:
1. Run the dns resolve command in the system view to enable dynamic DNS
resolution.
2. Run the dns server ip-address command in the system view to specify an IP
address for the DNS server.
3. Run the free-rule rule-id destination ip ip-address mask { mask-length | ip-
mask } command in the authentication-free rule profile to enable users to
access the DNS server without authentication.
Precautions
Wireless 802.1X authentication does not support this function.
When 802.1X authentication or MAC authentication is configured on a physical
interface, the free-rule command configuration will not take effect after the undo
authentication pre-authen-access enable command is configured to disable the
prec-connection function.
Pay attention to the following when you use common authentication-free rules:
● When multiple authentication-free rules are configured simultaneously, the
system matches the rules one by one.
● In a wireless scenario or an SVF system, only the authentication-free rules
with IDs in the range of 0 to 127 on the AP or AS can take effect. On the AC
or parent, all configured authentication-free rules take effect.
● In a wireless scenario, the VLAN ID and interface number cannot be specified
in authentication-free rules configured on an AP. You are advised to set the
authentication-free rule ID to 128 or a larger value when specifying the VLAN
ID and interface number. If the ID of an authentication-free rule is less than
128, Portal redirection cannot be performed.
● In an SVF system, interface information in an authentication-free rule is
invalid.
● If you specify both the VLAN ID and interface number in an authentication-
free rule, the interface must belong to the VLAN. Otherwise, the rule is
invalid.
● If the destination port number is configured in an authentication-free rule,
fragments cannot match the rule and packets cannot be forwarded.
The priority of the ACL rule delivered by the RADIUS server is higher than that of
the authentication-free rule configured on the device.
Example
# In the authentication-free rule profile default_free_rule, allow all NAC
authentication users to access the network with the IP address 10.1.1.1/24 without
authentication.
<HUAWEI> system-view
[HUAWEI] free-rule-template name default_free_rule
[HUAWEI-free-rule-default_free_rule] free-rule 1 destination ip 10.1.1.1 mask 24 source ip any
NOTE
Format
free-rule-template free-rule-template-name
undo free-rule-template
Parameters
Parameter Description Value
free-rule- Specifies the name of an The value must be the name of
template-name authentication-free rule an existing authentication-free
profile. rule profile.
Views
Authentication profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Before being authenticated, users need to obtain some network access rights to
meet basic network access requirements such as downloading the 802.1X client
and updating antivirus database. The device uses an authentication-free rule
profile to uniformly manage authorization information for authentication-free
users. You can define some network access rules in the profile to determine
network access rights that can be obtained by authentication-free users. You need
to bind a configured authentication-free rule profile to an authentication profile.
Users using the authentication profile then can obtain authentication-free
authorization information.
Prerequisites
An authentication-free rule profile has been created using the 13.4.115 free-rule-
template (system view) command.
When a large number of APs are online, do not run the free-rule-template or
undo free-rule-template command repeatedly because the device takes time to
execute the command. Otherwise, users cannot go online or offline properly in a
short period of time.
Example
# Bind the authentication-free rule profile default_free_rule to the authentication
profile p1.
<HUAWEI> system-view
[HUAWEI] authentication-profile name p1
[HUAWEI-authen-profile-p1] free-rule-template default_free_rule
Related Topics
13.4.61 display authentication-profile configuration
13.4.67 display free-rule-template configuration
Format
free-rule-template name free-rule-template-name
Parameters
Parameter Description Value
name free-rule- Specifies the name of an Currently, the device supports only
template-name authentication-free rule one authentication-free rule
profile. profile, that is, the built-in profile
default_free_rule.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To meet basic network access requirements of users who have not passed
authentication, the users need to obtain some network access rights without
authentication, for example, download 802.1X client software and update the
antivirus database. After creating an authentication-free rule profile using the
free-rule-template command, you can configure authentication-free rules in the
profile to allow the users to access the specified network resources without
authentication.
Follow-up Procedure
Run the 13.4.113 free-rule command in the authentication-free rule profile view
to configure authentication-free rules for users.
Precautions
Currently, the device supports only one authentication-free rule profile, that is, the
built-in profile default_free_rule.
For wired users, an authentication-free rule profile takes effect for all wired users
after it is created in the system view. The authentication-free rule profile does not
need to be bound to an authentication profile using the 13.4.114 free-rule-
template (authentication profile view) command in the authentication profile
view.
Example
# Display the view of the authentication-free rule profile default_free_rule.
<HUAWEI> system-view
[HUAWEI] free-rule-template name default_free_rule
[HUAWEI-free-rule-default_free_rule]
Related Topics
13.4.67 display free-rule-template configuration
NOTE
Format
http parse user-agent enable
undo http parse user-agent enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
User Agent (UA) is a field in the HTTP packet header. The UA field carries
information including the operating system used by the device and device version,
the CPU type, the browser and browser version, the language used by the browser,
and the browser plug-in.
If the UA function is enabled, the AC extracts the UA field from the HTTP Get
packet sent from the terminal that has passed 802.1X or Portal authentication,
and analyzes the UA information and combines it with the MAC address and
DHCP Option information to finally identify the terminal type.
Precautions
Currently, the device supports the UA of a maximum of 247 characters.
Example
# Enable the UA function.
<HUAWEI> system-view
[HUAWEI] http parse user-agent enable
Function
The http get-method enable command configures the device to allow users to
submit user name and password information to the device in GET mode during
Portal authentication.
The undo http get-method enable command restores the default setting.
By default, the device does not allow users to submit user name and password
information to the device in GET mode during Portal authentication.
Format
http get-method enable
Parameters
None
Views
Portal server template view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
By default, the device does not allow users to submit user name and password
information to the device in GET mode during Portal authentication. You can run
the http get-method enable command to configure the device to allow users to
submit user name and password information to the device in GET mode during
Portal authentication.
Precautions
The GET mode has the risk of password disclosure. Therefore, the POST mode is
recommended.
This command only applies to scenarios in which HTTP or HTTPS is used for Portal
connection establishment.
Example
# Configure the device to allow users to submit user name and password
information to the device in GET mode during Portal authentication.
<HUAWEI> system-view
[HUAWEI] web-auth-server abc
[HUAWEI-web-auth-server-abc] http get-method enable
Function
The http-method post command configures parameters for parsing and replying
to POST or GET request packets of the HTTP or HTTPS protocol.
By default, the system has configured parameters for parsing and replying to
POST or GET request packets of the HTTP or HTTPS protocol. For details, see the
"Parameters" table.
Format
http-method post { cmd-key cmd-key [ login login-key | logout logout-key ] * |
init-url-key init-url-key | login-fail response { err-msg { authenserve-reply-
message | msg msg } | redirect-login-url | redirect-url redirect-url [ append-
reply-message msgkey ] } | login-success response { msg msg | redirect-init-url
| redirect-url redirect-url } | logout-fail response { msg msg | redirect-url
redirect-url } | logout-success response { msg msg | redirect-url redirect-url } |
password-key password-key | user-mac-key user-mac-key | userip-key userip-key
| username-key username-key } *
Parameters
Parameter Description Value
Views
Portal server template view
Default Level
2: Configuration level
Usage Guidelines
When the device uses the HTTP or HTTPS protocol to communicate with the
Portal server, a user sends POST or GET request packets (carrying parameters such
as the user name and MAC address) to the device as required by the Portal server.
After receiving the POST or GET request packets, the device parses parameters in
the packets. If identification keywords of the parameters differ from those
configured on the device, the user authentication fails. Therefore, you need to run
the http-method post command to configure the identification keywords based
on the Portal server configuration.
After successful user login or logout, or a user login or logout failure, the device
sends the login or logout result to the user based on the http-method post
Example
# Set the command identification keyword to cmd1 for parsing POST or GET
request packets of the HTTP or HTTPS protocol.
<HUAWEI> system-view
[HUAWEI] web-auth-server abc
[HUAWEI-web-auth-server-abc] http-method post cmd-key cmd1
13.4.119 force-push
Function
The force-push command enables the forcible URL template or URL push
function.
The undo force-push command disables the forcible URL template or URL push
function.
Format
force-push { url-template template-name | url url-address }
undo force-push
Parameters
Parameter Description Value
Views
AAA domain view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
After a user is successfully authenticated, the device forcibly redirect the user to a
web page when receiving the HTTP or HTTPS packet from the user who accesses
web pages for the first time. In addition to pushing advertisement pages, the
device can obtain user terminal information through the HTTP or HTTPS packets
sent by the users, and apply the information to other services. There are two ways
to push web pages:
1. URL: pushes the URL corresponding to the web page.
2. URL template: pushes the URL template. A URL template must be created.
The URL template contains the URL of the pushed web page and URL
parameters.
Prerequisites
The URL configured using the 13.4.196 url (URL template view) command in the
URL template view cannot be a redirection URL; otherwise, the command does not
take effect.
Precautions
For the S5720HI, the forcible push function takes effect only for the first HTTP or
HTTPS packet received from the user. If an application program that actively sends
HTTP or HTTPS packets is installed on the user terminal, the terminal has sent the
HTTP or HTTPS packet before the user accesses a web page. Therefore, the user is
unaware of the web page push process.
The forcible push function takes effect only when a redirection ACL is configured
for switches excluding the S5720HI. If a redirection ACL exists in the user table, a
web page is forcibly pushed when HTTP packets from users match the redirection
ACL rule. Usually, you can configure the RADIUS server to authorize the Huawei
extended RADIUS attribute HW-Redirect-ACL to users for redirection ACL
implementation, or run the 13.1.72 redirect-acl command to configure a
redirection ACL.
For HTTP and HTTPS packets, the forcible push function takes effect only when a
redirection ACL is used. If the user table always contains redirection ACLs, a web
page is forcibly pushed when HTTPS packets from users match redirection ACL
rules.
If the switch functions as an AC and the direct forwarding mode is used in a
wireless scenario, the forcible web page push function is not supported.
A pushed URL configured in a domain need to be used together with a redirect
ACL or push flag attribute. The redirect ACL has a higher priority than the push
flag attribute. By default, a pushed URL configured in a domain carries the push
flag attribute. Users will be redirected to the pushed URL when they are
successfully authenticated.
When an IPv4 redirect ACL is configured for an IPv6 user or an IPv6 redirect ACL is
configured for an IPv4 user, the Push URL content field in the 13.4.55 display
access-user command output displays the pushed URL, but the browser of the
user cannot redirect to the pushed URL .
Switches except the S5720HI do not support concurrent use of the pushed URL
and redirection ACL6 functions. If both functions are configured, the Push URL
content field in the 13.4.55 display access-user command output displays the
pushed URL; however, the terminal browser cannot be redirected to the pushed
URL.
Example
# Push the URL template abc in the domain huawei.
<HUAWEI> system-view
[HUAWEI] url-template name abc
[HUAWEI-url-template-abc] quit
[HUAWEI] aaa
[HUAWEI-aaa] domain huawei
[HUAWEI-aaa-domain-huawei] force-push url-template abc
Function
The if-match vlan-id command configures the VLAN ID-based user identification
policy.
The undo if-match vlan-id command deletes the VLAN ID-based user
identification policy.
Format
if-match vlan-id { start-vlan-id [ to end-vlan-id ] } &<1-10>
Parameters
Parameter Description Value
Views
User context profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On some enterprise networks, VLANs are used to divide the entire network into
different areas with various security levels. The administrator requires that a user
should obtain different network access rights when the user connects to the
network from different areas. In this case, the user context identification function
can be enabled on access devices, and a group of VLANs that belong to the same
area are added to the same user context profile. The administrator then assigns
the mapping network access rights to different user context profiles based on the
security level of each area. When a user connects to the network from different
areas, the user is added to different user context profiles matching their access
VLANs and therefore obtains different network access rights.
Prerequisites
A user context profile has been created using the access-context profile name
profile-name command in the system view.
Precautions
This function takes effect only for users who go online after this function is
successfully configured.
Example
# In the user context profile p1, configure the user identification policy of
matching users in VLAN 10 to VLAN 20.
<HUAWEI> system-view
[HUAWEI] access-context profile name p1
[HUAWEI-access-context-p1] if-match vlan-id 10 to 20
13.4.121 if-match
Function
The if-match command configures the matching mode of terminal type
identification rules.
The undo if-match command deletes the matching mode of terminal type
identification rules.
By default, no matching mode of terminal type identification rules is configured.
NOTE
Format
if-match rule rule-id [ { and | or } rule rule-id ] &<1-7>
undo if-match
Parameters
Parameter Description Value
Views
Terminal type identification profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Prerequisite
The specified terminal type identification rules have been configured using the
rule command.
Precautions
If the parameter is specified as and and the terminal information does not match
the first rule, the AC sends a matching failure response and stops matching the
following rules.
The priority of and is higher than that of or. For example, you run the if-match
rule 1 or rule 2 and rule 3 or rule 4 and rule 5 or rule 6 and rule 7 or rule 0
command. If the terminal information matches any of the five rule combinations,
which are rule 1, rule 2 and rule 3, rule 4 and rule 5, rule 6 and rule 7, and rule 0,
the matching operation succeeds.
Example
# Specify that terminal information must match terminal type identification rule
1.
<HUAWEI> system-view
[HUAWEI] device-profile profile-name huawei
[HUAWEI-device-profile-huawei] if-match rule 1
Related Topics
13.4.179 rule (terminal type identification profile view)
13.4.62 display device-profile
NOTE
Format
ip-static-user enable
undo ip-static-user enable
Parameters
None
Views
Authentication profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
By default, the device identifies static users through MAC addresses. However, a
terminal may have one MAC address and multiple IP addresses, for example, a
firewall has multiple valid IP addresses that correspond to only one MAC address.
The terminal goes online only after the multiple IP addresses pass authentication.
If the device identifies terminals through MAC addresses, entry information about
IP addresses that are authenticated later continuously overwrites entry
information about IP addresses that are authenticated earlier. As a result, the
terminal cannot go online. You can run the ip-static-user enable command to
enable the function of identifying static users through IP addresses so that
terminals with one MAC address and multiple IP addresses can go online.
Prerequisites
A static user has been configured before this function is enabled.
1. A static user has been configured using the static-user start-ip-address [ end-
ip-address ] [ vpn-instance vpn-instance-name ] [ ip-user ] [ domain-name
domain-name | interface interface-type interface-number [ detect ] | mac-
address mac-address | vlan vlan-id ] * command.
2. The authentication user name has been configured for the static user using
the static-user username format-include { ip-address | mac-address |
system-name } command.
3. The authentication password has been configured for the static user using the
static-user password cipher password command.
Precautions
● For a terminal with one MAC address and multiple IP addresses, you must
configure the terminal as a static user and enable the function of identifying
static users through IP addresses so that the terminal can pass authentication
and go online. If ip-user is not specified when you configure static users, all
static users are processed by assuming they have one MAC address and
multiple IP addresses. To precisely identify and process static users with one
MAC address and multiple IP addresses, specify ip-user when configuring
these static users.
● The device does not support traffic statistics collection for a terminal with one
MAC address and multiple IP addresses.
● Configure wired users before enabling this function.
● This function takes effect only for users who go online after it is configured.
After the configuration on an interface is modified, online users on the
interface go offline.
● The device supports this function only when the user access mode is multi-
authen. For details on how to configure the user access mode, see 13.4.35
authentication mode.
● Static users who are identified through IP addresses directly go offline after
they fail to pass authentication. In this case, the display access-user (all
views) command cannot display any information about these users, including
their states: pre-authentication or authentication failure.
● Static users identified through IP addresses do not support MAC address
flapping.
● Static users identified through IP addresses do not support right control
during Layer 2 forwarding.
● Static users identified through IP addresses support only IP address-based
upstream authorization services (such as authorization UCL, isolation
between Layer 3 groups, CAR, and priority for upstream traffic), and do not
support downstream authorization services (such as CAR, re-marking action,
dynamic authorization VLAN, and HQoS for downstream traffic).
● In the policy association scenario, if the control point mode is set to open
using the authentication control-point open command, the device does not
support the function of identifying static users through IP addresses.
● For a terminal with one MAC address and multiple IP addresses, only ARP
packets can be used to trigger authentication. Therefore, ensure that the
device can perform authentication triggered by ARP packets; for example, the
types of packets that can trigger authentication must include ARP.
● If user A with multiple IP addresses and one MAC address is online and then
web user B with the same MAC address is successfully authenticated, the
entry of user A is overwritten by that of user B. In this case, user A still has
network access rights.
Example
# Enable the function of identifying static users through IP addresses in the
authentication profile p1.
<HUAWEI> system-view
[HUAWEI] authentication-profile name p1
[HUAWEI-authen-profile-p1] ip-static-user enable
Related Topics
13.4.185 static-user
13.4.187 static-user username format-include
13.4.186 static-user password
13.4.82 display static-user
13.4.61 display authentication-profile configuration
Format
link-down offline delay { delay-value | unlimited }
undo link-down offline delay
Parameters
Parameter Description Value
Views
Authentication profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If a link is faulty, the interface is interrupted and users are directly logged out. To
solve this problem, you can configure the user logout delay function. When the
interface link is faulty, the users remain online within the delay. In this case, if the
link is restored, the users do not need to be re-authenticated. If the users are
disconnected after the delay and the link is restored, the users need to be re-
authenticated.
Precautions
● This function takes effect only for wired users who go online on Layer 2
physical interfaces that have been configured with NAC authentication.
● To make the function take effect, it is recommended that the configured
interval be greater than the time during which the interface is in Up state.
Example
# In the authentication profile p1, set the user logout delay to 5 seconds when the
link is faulty.
<HUAWEI> system-view
[HUAWEI] authentication-profile name p1
[HUAWEI-authen-profile-p1] link-down offline delay 5
Format
mac-access-profile access-profile-name
undo mac-access-profile
Parameters
Parameter Description Value
Views
Authentication profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The authentication type used by an authentication profile is determined by the
access profile bound to the authentication profile. After being bound to a MAC
access profile, the authentication profile is enabled with MAC address
authentication. After the authentication profile is applied to the interface or VAP
profile, MAC address authentication can be performed on online users.
Prerequisites
A MAC access profile has been created using the 13.4.125 mac-access-profile
(system view) command.
Follow-up Procedure
Run the 13.4.42 authentication-profile (Interface view or VAP profile view)
command to apply the authentication profile to the interface or VAP profile.
Precautions
Example
# Bind the authentication profile mac_authen_profile1 to the MAC access profile
mac_access_profile.
<HUAWEI> system-view
[HUAWEI] mac-access-profile name mac_access_profile
[HUAWEI-mac-access-profile-mac_access_profile] quit
[HUAWEI] authentication-profile name mac_authen_profile1
[HUAWEI-authen-profile-mac_authen_profile1] mac-access-profile mac_access_profile
Related Topics
13.4.61 display authentication-profile configuration
Function
The mac-access-profile command creates a MAC access profile and displays the
MAC access profile view.
Format
mac-access-profile name access-profile-name
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The device uses MAC access profiles to uniformly manage all MAC users access
configurations. To perform MAC address authentication for the users in the
interface or VAP profile, bind the authentication profile applied to the interface or
VAP profile to a MAC access profile.
Follow-up Procedure
Run the 13.4.124 mac-access-profile (authentication profile view) command in
the authentication profile view to bind the authentication profile to a MAC access
profile.
Precautions
● The compatibility profile converted after an upgrade is not counted in the
configuration specification. The built-in MAC access profile
mac_access_profile can be modified and applied, but cannot be deleted.
● Before deleting a MAC access profile, ensure that this profile is not bound to
any authentication profile.
Example
# Create the MAC access profile named mac_access_profile.
<HUAWEI> system-view
[HUAWEI] mac-access-profile name mac_access_profile
Related Topics
13.4.70 display mac-access-profile configuration
Format
mac-authen offline dhcp-release
undo mac-authen offline dhcp-release
Parameters
None
Views
MAC access profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After MAC address authentication users who send DHCP Release packets go
offline, the corresponding user entries on the device cannot be deleted
immediately. This occupies device resources and possibly prevents other users from
going online. You can run this command to enable the device to clear the user
entries in real time when MAC address authentication users go offline.
Precautions
MAC address authentication users who go online through VLANIF interfaces do
not support this function.
If the device functions as a DHCP relay agent, configure the DHCP snooping
function on the device; otherwise, this command does not take effect.
This function takes effect only in L2 BNG scenarios.
Example
# In the MAC access profile m1, enable the device to clear user entries when
receiving DHCP Release packets from MAC address authentication users.
<HUAWEI> system-view
[HUAWEI] mac-access-profile name m1
[HUAWEI-mac-access-profile-m1] mac-authen offline dhcp-release
NOTE
Only S5720EI, S1720X, S1720X-E, S5720HI, S5720S-SI, S5720SI, S5730S-EI, S5730SI, S6720LI,
S6720S-LI, S6720S-SI, S6720SI, S6720EI, and S6720S-EI support this command.
Format
mac-authen permit mac-address mac-address mask { mask | mask-length }
Parameters
Parameter Description Value
Views
MAC access profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If a new MAC address entry is generated on the device after MAC address
authentication is enabled on a VLANIF interface, MAC address authentication will
be performed for the corresponding user. To actually control the users who can be
authenticated using MAC addresses on the VLANIF interface, use this command to
specify a MAC address range for MAC address authentication.
Precautions
Only MAC address authentication users who go online through VLANIF interfaces
support this function.
A maximum of eight MAC address ranges are allowed for MAC address
authentication on a VLANIF interface.
Example
# In the MAC access profile m1, set the MAC address to 0002-0002-0002 and the
MAC address mask length to 24 for MAC address authentication.
<HUAWEI> system-view
[HUAWEI] mac-access-profile name m1
[HUAWEI-mac-access-profile-m1] mac-authen permit mac-address 0002-0002-0002 mask 24
Format
mac-authen quiet-times fail-times
undo mac-authen quiet-times
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The quiet function for MAC address authentication is enabled on a device by
default. When the maximum number of authentication failures exceeds 10 within
60 seconds, the device quiets a MAC address authentication user and does not
process authentication requests from the user, reducing impact on the system
caused by attackers.
Precautions
After the maximum number of authentication failures is set to a value larger than
the configured value, the user in quiet state can initiate reauthentication only
after the quiet period expires. If the user enters an incorrect user name or
password again, the user authentication fails. The device does not quiet the user
but allows the user to initiate reauthentication immediately.
The quiet function for MAC address authentication users takes effect only after
the pre-connection function is disabled using the undo authentication pre-
authen-access enable command and the device is disabled from assigning
network access rights to users in each phase before authentication succeeds using
the undo authentication event action authorize command. In multi-mode
authentication of MAC address authentication users, the quiet function for MAC
address authentication users does not take effect.
Example
# Set the maximum number of authentication failures within 60 seconds to 4.
<HUAWEI> system-view
[HUAWEI] mac-authen quiet-times 4
Format
mac-authen reauthenticate mac-address mac-address
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
For details, see 13.4.130 mac-authen reauthenticate.
The mac-authen reauthenticate mac-address and 13.4.130 mac-authen
reauthenticate commands re-authenticate online MAC address authentication
users and their difference is as follows:
● The mac-authen reauthenticate mac-address command configures the
device to immediately re-authenticate a user with a specified MAC address for
once.
● The 13.4.130 mac-authen reauthenticate command configures the device to
re-authenticate all online MAC address authentication users at intervals.
Example
# Enable re-authentication for an online MAC address authentication user with
the MAC address 0001-0002-0003.
<HUAWEI> system-view
[HUAWEI] mac-authen reauthenticate mac-address 0001-0002-0003
Format
mac-authen reauthenticate
undo mac-authen reauthenticate
Parameters
None
Views
MAC access profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the user goes online, the device saves authentication parameters of the user.
After re-authentication is configured for online MAC address authentication users,
the device automatically sends the user authentication parameters in the MAC
access profile to the authentication server at an interval (specified using the
13.4.133 mac-authen timer reauthenticate-period command) for re-
authentication. If the user authentication information on the authentication server
remains unchanged, the users are kept online. If the information has been
changed, the users are disconnected and need to be re-authenticated based on
the changed authentication parameters.
Precautions
If the device is connected to a server for re-authentication and the server replies
with a re-authentication deny message that makes an online user go offline, it is
recommended that you locate the cause of the re-authentication failure on the
server or disable the re-authentication function on the device.
Example
# In the MAC access profile mac_access_profile, configure re-authentication for
online MAC address authentication users.
<HUAWEI> system-view
[HUAWEI] mac-access-profile name mac_access_profile
[HUAWEI-mac-access-profile-mac_access_profile] mac-authen reauthenticate
Related Topics
13.4.70 display mac-access-profile configuration
Function
The mac-authen reauthenticate dhcp-renew command enables the device to re-
authenticate the users when receiving DHCP lease renewal packets from MAC
address authentication users.
By default, the device does not re-authenticate the users when receiving DHCP
lease renewal packets from MAC address authentication users.
Format
mac-authen reauthenticate dhcp-renew
undo mac-authen reauthenticate dhcp-renew
Parameters
None
Views
MAC access profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After users go online, the administrator may modify the users' authentication
parameters or network access rights on the authentication server. To ensure user
validity or update the users' network access rights in real time, you can run this
command to enable the device to re-authenticate the users when receiving DHCP
lease renewal packets from MAC address authentication users.
Precautions
MAC address authentication users who go online through a VLANIF interface do
not support re-authentication.
This function applies only to Layer 2 BNG scenarios.
Example
# In the MAC access profile m1, enable the device to re-authenticate the users
when receiving DHCP lease renewal packets from MAC address authentication
users.
<HUAWEI> system-view
[HUAWEI] mac-access-profile name m1
[HUAWEI-mac-access-profile-m1] mac-authen reauthenticate dhcp-renew
Format
mac-authen timer quiet-period quiet-period-value
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
If a MAC address authentication user fails to be authenticated consecutively
within a short period, the system is affected and a large number of duplicated
authentication failure logs are generated.
After the quiet function is enabled, if the number of times that a MAC address
authentication user fails to be authenticated within 60s exceeds the upper limit
(configured using the 13.4.128 mac-authen quiet-times command), the device
discards the user's MAC address authentication request packets for a period to
avoid frequent authentication failures.
NOTE
The quiet function for MAC address authentication users takes effect only after the pre-
connection function is disabled using the undo authentication pre-authen-access enable
command and the device is disabled from assigning network access rights to users in each
phase before authentication succeeds using the undo authentication event action authorize
command. In multi-mode authentication of MAC address authentication users, the quiet
function for MAC address authentication users does not take effect.
Example
# Set the quiet period to 100 seconds for MAC address authentication users who
fail to be authenticated.
<HUAWEI> system-view
[HUAWEI] mac-authen timer quiet-period 100
Format
mac-authen timer reauthenticate-period reauthenticate-period-value
undo mac-authen timer reauthenticate-period
Parameters
Parameter Description Value
Views
MAC access profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After configuring the re-authentication function for online MAC address
authentication users using the 13.4.130 mac-authen reauthenticate command,
run the mac-authen timer reauthenticate-period command to configure the re-
authentication interval. The device then re-authenticates online users at the
specified interval, ensuring that only authorized users can keep online.
Precautions
Generally, the default re-authentication interval is recommended. If many ACL
rules need to be delivered during user authorization, to improve the device
processing performance, you are advised to disable re-authentication or increase
Example
# In the MAC access profile mac_access_profile, configure the re-authentication
interval for online MAC address authentication users to 2000 seconds.
<HUAWEI> system-view
[HUAWEI] mac-access-profile name mac_access_profile
[HUAWEI-mac-access-profile-mac_access_profile] mac-authen timer reauthenticate-period 2000
Related Topics
13.4.130 mac-authen reauthenticate
13.4.70 display mac-access-profile configuration
Format
mac-authen username { fixed username [ password cipher password ] |
macaddress [ format { with-hyphen [ normal ] | without-hyphen }
[ uppercase ] [ password cipher password ] ] | dhcp-option option-code
{ circuit-id | remote-id } * [ separate separate ] [ format-hex ] password cipher
password }
undo mac-authen username [ fixed username [ password cipher password ] |
macaddress [ format { with-hyphen [ normal ] | without-hyphen }
[ uppercase ] [ password cipher password ] ] | dhcp-option option-code
[ circuit-id | remote-id ] * [ password cipher password ] ]
Parameters
Parameter Description Value
fixed username Specifies a fixed user name for MAC The value is a
address authentication. string of 1 to
64 case-
sensitive
characters
without
spaces. When
double
quotation
marks are
used around
the string,
spaces are
allowed in
the string.
Views
MAC access profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The following user name formats are available for MAC address authentication:
● Fixed user name: A user uses the fixed user name and password configured by
the administrator for authentication.
● MAC address: A user uses the MAC address as the user name for
authentication. In addition, the MAC address or user-defined character string
can be used as the password.
● When the DHCP option format is used for MAC address authentication, the
device uses the DHCP option it obtains and password set by the administrator
for authentication. In this mode, ensure that the device supports MAC address
authentication triggered through DHCP packets.
By default, the device sends the user MAC address as the user name and password
to the authentication server for authentication. However, the users cannot be
easily identified and managed in this case. To flexibly identify and manage users,
run the mac-authen username command to configure fixed user names and
passwords for MAC address authentication users.
Precautions
● When configuring the user name format for MAC address authentication,
ensure that the authentication server supports the user name format.
● If MAC address authentication is enabled on a VLANIF interface, on an Eth-
Trunk, in a port group, or in a VAP profile, and MAC address authentication
users use fixed user names, passwords must be configured. If MAC address
authentication is enabled in a port group and MAC addresses are used as user
names, passwords cannot be configured. If MAC address authentication is
enabled on a VLANIF interface or in a VAP profile, user names for MAC
address authentication cannot be set to specified DHCP option information.
● When the user names for MAC address authentication are in the DHCP option
format, the DHCP Option82 cannot be configured in the extend format or a
customized format (non character string) by using the 14.8.6 dhcp option82
format command.
Example
# In the MAC access profile mac_access_profile, configure the device to use the
MAC address containing hyphens (-) as the user name.
<HUAWEI> system-view
[HUAWEI] mac-access-profile name mac_access_profile
[HUAWEI-mac-access-profile-mac_access_profile] mac-authen username macaddress format with-
hyphen
Related Topics
13.4.70 display mac-access-profile configuration
Function
The match access-context-profile action command configures the network
access rights for specified users in each phase before authentication success based
on user context profiles.
By default, no network access right is configured for specified users in each phase
before authentication success.
Format
match access-context-profile profile-name action { authen-fail service-scheme
service-scheme-name | authen-server-down service-scheme service-scheme-
name | authen-server-up re-authen | client-no-response service-scheme
service-scheme-name | portal-server-down service-scheme service-scheme-name
| portal-server-up re-authen | pre-authen service-scheme service-scheme-
name } *
undo match access-context-profile profile-name action { authen-fail | authen-
server-down | authen-server-up | client-no-response | portal-server-down |
portal-server-up | pre-authen } *
Parameters
Parameter Description Value
service-scheme service- Specifies the name of the service The value must
scheme-name scheme based on which network be the name of
access rights are assigned to an existing
users. service scheme
name on the
device.
Views
User authentication event authorization policy view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Users need basic network access rights before they are authenticated. For
example, the users need to download 802.1X clients and update the antivirus
database. A user authentication event authorization policy can be used to bind the
network access rights of users in each phase before authentication success to a
user context profile. When a user goes online after a user authentication event
authorization policy is applied to the device, the device adds the user to the
context profile based on the user context identification result, and assigns the
network access rights to the user based on the user authentication result. The
match access-context-profile action command can be used to configure the
network access rights for users in each phase (including an authentication failure,
an authentication server fault, and no response from the users) before
authentication success.
Prerequisites
● A service scheme has been created using the service-scheme command in the
AAA view.
● A user context profile has been created using the access-context profile
name profile-name command in the system view.
Follow-up Procedure
In the global view, run the access-author policy global command to apply the
user authentication event authorization policy.
Precautions
The priority of user authorization based on a user context profile is higher than
that of user authorization in an authentication profile.
This function takes effect only for users who go online after this function is
successfully configured.
Example
# Match the user authentication event authorization policy a1 with the
identification result of the user context profile p1, and use the service scheme s1
to authorize the users who fail to be authenticated.
<HUAWEI> system-view
[HUAWEI] access-context profile name p1
[HUAWEI-access-context-p1] quit
[HUAWEI] aaa
[HUAWEI-aaa] service-scheme s1
[HUAWEI-aaa-service-s1] quit
[HUAWEI-aaa] quit
[HUAWEI] access-author policy name a1
[HUAWEI-access-author-a1] match access-context-profile p1 action authen-fail service-scheme s1
Format
match access-context-profile profile-name action access-domain domain-name
[ dot1x | mac-authen | portal ] * [ force ]
Parameters
Parameter Description Value
Views
User authentication event authorization policy view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In some enterprise networks, VLAN is divided into multiple areas with different
security levels. The administrator assigns different network access rights to access
users in different areas. The device uses the domain to manage users, so the
access user's authentication domain can be configured based on the user context
profile. Based on different context profiles matching with access VLANs, users in
different areas have different authentication domains and are assigned different
network access rights.
Prerequisites
● A domain has been configured using the 13.1.47 domain (AAA view)
command in the AAA view.
● A user context profile has been configured using the access-context profile
name profile-name command in the system view.
Precautions
The priorities of the forcible domain, domain carried in the user name, and default
domain in different views are as follows in descending order: forcible domain with
a specified authentication mode in an authentication profile > forcible domain in
an authentication profile > forcible domain with a specified authentication mode
based on a user context profile > forcible domain based on a user context profile >
domain carried in the user name > default domain with a specified authentication
mode in an authentication profile > default domain in an authentication profile >
default domain with a specified authentication mode based on a user context
profile > default domain based on a user context profile > global default domain.
Example
In the user authentication event authorization policy view, configure the user's
forcible domain huawei based on the user context profile p1.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] domain huawei
[HUAWEI-aaa-domain-huawei] quit
[HUAWEI-aaa] quit
[HUAWEI] access-context profile name p1
[HUAWEI-access-context-p1] quit
[HUAWEI] access-author policy name a1
[HUAWEI-access-author-a1] match access-context-profile p1 action access-domain huawei force
13.4.137 parameter
Function
The parameter command sets the characters used in URL.
Format
parameter { start-mark parameter-value | assignment-mark parameter-value |
isolate-mark parameter-value } *
undo parameter { start-mark parameter-value | assignment-mark parameter-
value | isolate-mark parameter-value } *
Parameters
Parameter Description Value
Views
URL template view
Default Level
2: Configuration level
Usage Guidelines
The parameter command allows you to customize the characters in URL.
For example, if the URL configured using the 13.4.196 url (URL template view)
command in the URL template bound to a Portal server profile is http://10.1.1.1,
you can run the 13.4.199 url-parameter command to add the user MAC address,
user IP address, and device system name to the URL by specifying the user_mac,
user_ip, and device parameters.
When a user with IP address 10.1.1.11 and MAC address 0002-0002-0002 connects
to an access device huawei, the access device redirects the user to http://10.1.1.1?
user_mac=0002-0002-0002&user_ip=10.1.1.11&device=huawei for Portal
authentication. In the redirection URL, ? is the default start character, = is the
default assignment character, & is the delimiter between parameters.
NOTE
If parameter-value is set to a question mark (?) in the URL, the command cannot be executed.
Example
# Change the start character in a URL from # to ?.
<HUAWEI> system-view
[HUAWEI] url-template name huawei
[HUAWEI-url-template-huawei] parameter start-mark #
Format
port port-number [ all ]
undo port [ all ]
Parameters
Parameter Description Value
port-number Specifies the port number that the Portal server The value is
uses to receive and encapsulate UDP packets from an integer
the device. that ranges
from 1 to
65535. By
default, the
value is
50100.
all Indicates that the device always uses the -
destination port number specified by port-number
to encapsulate UDP packets.
NOTE
After this keyword is specified, when receiving UDP
packets from a Portal server, the device does not obtain
the source port number in the UDP packets as the
destination port number of UDP packets to be sent to
the Portal server. If the value of port-number is different
from the source port number of the Portal server, the
Portal server cannot receive the UDP packets sent by the
device. Therefore, this keyword is not recommended.
Views
Portal server profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After creating a Portal server profile on the device using the 13.4.211 web-auth-
server (system view) command, configure parameters for the template.
Run the port command to set the port number that a Portal server uses to receive
notification packets from the device. After receiving a Portal authentication
request packet from a user, the device sends the packet to the Portal server using
the specified destination port number.
Precautions
Ensure that the port number configured on the device is the same as that used by
the Portal server.
Example
# Set the port number that a Portal server uses to receive packets from the device
to 10000 in the Portal server profile huawei.
<HUAWEI> system-view
[HUAWEI] web-auth-server huawei
[HUAWEI-web-auth-server-huawei] port 10000
Related Topics
13.4.89 display web-auth-server configuration
13.4.211 web-auth-server (system view)
Function
The portal auth-network command configures the source subnet for Portal
authentication.
By default, the source subnet for Portal authentication is 0.0.0.0/0, indicating that
users in all subnets must pass Portal authentication.
Format
portal auth-network network-address { mask-length | mask-address }
Parameters
Parameter Description Value
Views
Portal access profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the source subnet for Portal authentication is configured, only user packets
from the subnet can trigger Portal authentication. If an unauthenticated user is
not on a Portal authentication subnet and packets from the user do not match
any Portal authentication-free rule, the device discards the user's packets.
Precautions
The command takes effect only for Layer 3 Portal authentication. In Layer 2 Portal
authentication, users on all subnets must be authenticated.
Example
# In the Portal access profile p1, set the source authentication subnet to
10.1.1.0/24.
<HUAWEI> system-view
[HUAWEI] portal-access-profile name p1
[HUAWEI-portal-acces-profile-p1] portal auth-network 10.1.1.0 24
Related Topics
13.4.77 display portal-access-profile configuration
NOTE
Format
portal captive-adaptive enable
undo portal captive-adaptive enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Since WLANs are widely provided, users have a demand for quick and convenient
authentication by using applications on mobile terminals, without entering user
names and passwords. In such authentication mode, mobile terminals need to
automatically display the application-based Portal authentication page and the
applications need to communicate with the background server. Therefore, the
mobile terminals must be connected to the WLANs during authentication.
iOS terminals such as iPhones, iPads, and iMac computers provide the CNA
function. This function automatically detects the network connection status after
iOS terminals connect to WLANs. If the network is disconnected, the iOS terminals
display a page prompting users to enter user names and passwords. If users do
not enter the user names and passwords, the iOS terminals automatically
disconnect from the WLANs. As a result, users cannot use applications on iOS
terminals for authentication.
To solve the problem, enable the CNA adaptive function so that iOS terminals are
redirected to the application-based Portal authentication page when they connect
to WLANs. Users can click the link on the page to start specified applications to
perform Portal authentication. If users do not start applications to perform
authentication, they can still access authentication-free resources on the WLANs.
Precautions
When applications on iOS mobile terminals are used to perform Portal
authentication, you can run only the portal captive-bypass enable command to
enable the CNA bypass function. After this function is enabled, users who have
logged in to the applications can be automatically authenticated and connect to
networks, without entering their user names and passwords.
If you run both the portal captive-adaptive enable and portal captive-bypass
enable commands, the command executed later takes effect.
Due to restrictions of iOS 9.3.1, mobile terminals using iOS 9.3.1 cannot connect to
WLANs after the CNA adaptive function is enabled. To solve this problem, run the
portal captive-bypass enable command to enable the CNA bypass function.
Terminal users then can be redirected to the application-based Portal
authentication page after they open the browser and access a web page.
Authentication-free resources accessed by users cannot contain the URL
captive.apple.com; otherwise, terminals cannot automatically display the Portal
authentication page.
If the Portal authentication page is of the HTTPS type, terminals can automatically
display the Portal authentication page only when an HTTPS URL is used and the
domain name certificate is valid.
Example
# Enable the CNA adaptive function for iOS terminals.
<HUAWEI> system-view
[HUAWEI] portal captive-adaptive enable
NOTE
Format
portal captive-bypass enable
undo portal captive-bypass enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The iOS operating system provides the Captive Network Assistant (CNA) function.
With the CNA function, the iOS terminals (including iPhone, iPad, and iMAC)
automatically detects wireless network connectivity after associating with a
wireless network. If the network connection cannot be set up, the iOS terminals
ask users to enter user names and passwords. If users do not enter the user names
and passwords, the iOS terminals automatically disconnect from the wireless
network.
Precautions
After the CNA bypass function is enabled for iOS terminals, the Portal
authentication page will not be automatically displayed for iOS terminals.
Example
# Enable the CNA bypass function for iOS terminals.
<HUAWEI> system-view
[HUAWEI] portal captive-bypass enable
Format
portal https-redirect enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Many well-known websites such as Google and Baidu use Hypertext Transfer
Protocol Secure (HTTPS). When users visit these websites, it is required that users
should be redirected to the Portal authentication page so that Portal
authentication can be performed and the users can normally access the network.
If unauthenticated Portal users visit websites using HTTPS after HTTPS redirection
of Portal authentication is enabled, the device can redirect the users to the Portal
authentication page.
Precautions
Example
# Enable HTTPS redirection of Portal authentication.
<HUAWEI> system-view
[HUAWEI] portal https-redirect enable
NOTE
This command applies only to test environments, but not commercial environments.
Format
portal https-redirect wired enable
undo portal https-redirect wired enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
To use the function supported by this command, upgrade the switch to
V200R013C00SPC500 or a later version.
Example
# Enable HTTPS redirection for wired Portal authentication users.
<HUAWEI> system-view
[HUAWEI] portal https-redirect wired enable
By default, no advertisement image file is loaded to the built-in Portal server login
page.
Format
portal local-server ad-image load ad-image-file
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
There is a blank area on the login page of the default page package used by the
built-in Portal server. Users can customize this area by loading an advertisement
image file. When the login page needs to be customized based on special
requirements, the administrator can upload the user-defined advertisement image
file to the device and run the portal local-server ad-image load command. After
the advertisement image file is loaded, the user-defined advertisement images are
displayed on the built-in Portal server login page for authentication.
Prerequisites
The user-defined advertisement image file has been uploaded to the device.
Example
# Load the advertisement image file ad.png to the built-in Portal server login
page.
<HUAWEI> system-view
[HUAWEI] portal local-server ad-image load flash:/ad.png
Info: The loading process may take a few seconds.Please wait for a moment.
Info: Load web file successfully.
Related Topics
13.4.75 display portal local-server
Format
portal local-server anonymous [ redirect-url url ]
undo portal local-server anonymous [ redirect-url ]
Parameters
Parameter Description Value
Views
Portal access profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In places such as airports, hotels, cafes, and public recreation places, the
anonymous login function allows users to access the network without entering the
user name and password, facilitating network service provisioning.
After the anonymous login function is enabled, users are redirected to the login
page the first time they access a web page. To connect to the network, users only
need to accept terms in the license agreement and click Login.
If the redirect-url url parameter is specified, the web page corresponding to the
specified URL will be automatically displayed when anonymous login users access
web pages for the first time. This function can be used for advertisement push and
users are unaware of the anonymous login process, improving user experience.
Precautions
Example
# In the Portal access template p1, configure the anonymous login function for
users authenticated through the built-in Portal server.
<HUAWEI> system-view
[HUAWEI] portal-access-profile name p1
[HUAWEI-portal-acces-profile-p1] portal local-server anonymous
Related Topics
13.4.77 display portal-access-profile configuration
Format
portal local-server authentication-method { chap | pap }
undo portal local-server authentication-method
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Password Authentication Protocol (PAP) is a two-way handshake authentication
protocol. It transmits passwords in plain text format in RADIUS packets.
Challenge Handshake Authentication Protocol (CHAP) is a three-way handshake
authentication protocol. It transmits only user names using RADIUS packets, but
does not transmit passwords. CHAP is more secure and reliable than PAP. If high
security is required, CHAP is recommended.
Prerequisites
The built-in Portal server function has been enabled globally using the portal
local-server command.
Example
# Configure the built-in Portal server to use PAP to authenticate Portal users.
<HUAWEI> system-view
[HUAWEI] portal local-server authentication-method pap
Function
The portal local-server background-color command configures the background
color of the built-in Portal server login page.
Format
portal local-server background-color background-color-value
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Users can customize the login page of the default page package used by the built-
in Portal server. The administrator can configure the background color of the login
page.
Example
# Configure the user-defined background color of the built-in Portal server.
<HUAWEI> system-view
[HUAWEI] portal local-server background-color #AABBCC
Format
portal local-server background-image load { background-image-file | default-
image1 }
undo portal local-server background-image load
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Users can customize the login page of the default page package used by the built-
in Portal server. Users can customize background images or select the default
ones. When the background image of the login page needs to be customized
based on special requirements, the administrator can upload the user-defined
background image file to the device and run the portal local-server background-
image load command. After the image is loaded, the user-defined background
image file is displayed on the built-in Portal server login page for authentication.
Prerequisites
The user-defined background image has been uploaded to the device.
Example
# Load the background image file bg.png to the built-in Portal server login page.
<HUAWEI> system-view
[HUAWEI] portal local-server background-image load flash:/bg.png
Info: The loading process may take a few seconds.Please wait for a moment.
Info: Load web file successfully.
Format
portal local-server enable
undo portal local-server enable
Parameters
None
Views
Portal access profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In Portal authentication, the device needs to provide the IP address of the Portal
server. The device supports external and built-in Portal servers. When the built-in
Portal server is required to authenticate users, enable the built-in Portal server
function globally and then run the portal local-server enable command in the
Portal access profile. Then the built-in Portal server can be used to authenticate
the users who use the Portal access profile.
Prerequisites
The built-in Portal server function has been enabled globally using the 13.4.154
portal local-server command.
Example
# In the Portal access profile p1, enable the built-in Portal server function.
<HUAWEI> system-view
[HUAWEI] interface loopback 1
[HUAWEI-LoopBack1] ip address 10.1.1.1 24
[HUAWEI-LoopBack1] quit
[HUAWEI] portal local-server ip 10.1.1.1
[HUAWEI] ssl policy s1
[HUAWEI-ssl-policy-s1] quit
[HUAWEI] portal local-server https ssl-policy s1
[HUAWEI] portal-access-profile name p1
[HUAWEI-portal-acces-profile-p1] portal local-server enable
Related Topics
13.4.77 display portal-access-profile configuration
Format
portal local-server ip ip-address
undo portal local-server ip
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When the device is used as a built-in Portal server, you can run the portal local-
server ip command to configure an IP address for the built-in Portal server. Users
are then redirected to the Portal server if they enter URLs that are not located in
the free IP subnet.
NOTE
● The IP address assigned to the built-in Portal server must have a reachable route to the
user.
● It is recommended that a loopback interface address be assigned to the built-in Portal
server because the loopback interface is stable. Additionally, packets destined for
loopback interfaces are not sent to other interfaces on the network; therefore, system
performance is not deteriorated even if many users request to go online.
● After users go online through the built-in Portal server, if the interface address or
interface (non-physical interface) matching the built-in Portal server's IP address is
deleted, online users cannot go offline and offline users cannot go online. Therefore,
exercise caution when you delete the interface address or interface.
Example
# Assign the IP address 10.1.1.1 to the built-in Portal server.
<HUAWEI> system-view
[HUAWEI] interface loopback 1
[HUAWEI-LoopBack1] ip address 10.1.1.1 24
[HUAWEI-LoopBack1] quit
[HUAWEI] portal local-server ip 10.1.1.1
Function
The portal local-server keep-alive command configures the heartbeat detection
interval and mode of the built-in Portal server.
By default, the heartbeat detection function of the built-in Portal server is not
configured.
Format
portal local-server keep-alive interval interval-value [ auto ]
Parameters
Parameter Description Value
interval interval- Specifies the heartbeat detection The value is an
value interval of the built-in Portal server. integer that ranges
from 30 to 7200, in
seconds.
auto Specifies the automatic detection -
mode.
If this parameter is not configured, the
forcible detection mode is specified.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a user closes the browser or an exception occurs, the device can detect the
user's online state to determine whether to make the user go offline. The
administrator can configure the heartbeat detection function of the built-in Portal
server. If the device does not receive a heartbeat packet from the client within a
specified period, the user is specified to go offline. The heartbeat detection mode
of the built-in Portal server can be either of the following modes:
● Forcible detection mode: This mode is valid for all users. If the device does not
receive a heartbeat packet from a user within a specified period, the device
specifies the user to go offline.
● Automatic detection mode: The device checks whether the client browser
supports the heartbeat program. If yes, the forcible detection mode is used for
the user; if no, the device does not detect the user. You are advised to
configure this mode to prevent users from going offline because the browser
does not support the heartbeat program.
NOTE
Currently, the heartbeat program is supported by Internet Explorer 8, FireFox 3.5.2, Chrome
28.0.1500.72, and Opera 12.00 on Windows 7. A Java program must be installed and
configured on the operating system.
Browsers using Java1.7 and later versions do not support the heartbeat program.
Precautions
When the forcible detection mode is configured, the device specifies users to go
offline to prevent from failing to receive heartbeat packets for a long time during
network congestion. In this scenario, the heartbeat detection interval must be
increased.
If you run this command multiple times in the same view, only the latest
configuration takes effect.
Example
# Configure the automatic detection function of the built-in Portal server.
<HUAWEI> system-view
[HUAWEI] portal local-server keep-alive interval 60 auto
Format
portal local-server load string
undo portal local-server load
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Customized page file packages can be loaded to the built-in Portal server.
Prerequisites
The page file (.zip) has been uploaded from the PC to the device storage media.
Precautions
The default page file package can be modified but cannot be deleted. If it is
deleted, the built-in Portal server fails to load the pages after startup.
This function is used by technical support personnel to develop limited page
customization based on customer requirements and does not apply to
customization by customers themselves.
Example
# Load the page file portalpage_01.zip on the built-in Portal server.
<HUAWEI> system-view
[HUAWEI] portal local-server load portalpage_01.zip
Warning: Portal local server has been enabled, and this operation will affect online user, continue?[Y/N]:y
Related Topics
13.4.76 display portal local-server page-information
13.4.75 display portal local-server
Format
portal local-server logo load logo-file
undo portal local-server logo load
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
There is a blank area on the login page of the default page package used by the
built-in Portal server. Users can customize this area by loading a logo file. When
the login page needs to be customized based on special requirements, the
administrator can upload the user-defined logo file to the device and run the
portal local-server logo load command. After the logo file is loaded, the user-
defined logo is displayed on the built-in Portal server login page for
authentication.
Prerequisites
The user-defined logo file has been uploaded to the device.
Example
# Load the logo file logo.png to the built-in Portal server login page.
<HUAWEI> system-view
[HUAWEI] portal local-server logo load flash:/logo.png
Info: The loading process may take a few seconds.Please wait for a moment.
Info: Load web file successfully.
Related Topics
13.4.75 display portal local-server
Format
portal local-server https ssl-policy policy-name [ port port-num ]
undo portal local-server https
Parameters
Parameter Description Value
port port-num Specifies the TCP port The value can be 443 or
number used. any integer in the range
If you do not specify a of 1025 to 55535. By
port number, the default default, the port number
port number is used. is 443.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Compared with an external Portal server, a built-in Portal server is easy to use,
cost-effective, and easy to maintain. After a built-in Portal server is configured,
Portal authentication can be implemented for users without an external Portal
server. When using the portal local-server command to enable the built-in Portal
server function, configure the built-in Portal server to exchange authentication
messages with users using the HTTPS protocol. HTTPS is a secure extension of
HTTP and uses the SSL protocol to guarantee secure communication. To enable
the built-in Portal server to exchange authentication messages using HTTPS, you
need to configure an SSL policy and load a digital certificate to the server.
Prerequisites
● The IP address of the built-in Portal server has been configured using the
13.4.150 portal local-server ip command.
● An SSL policy has been configured using the ssl policy policy-name command
in the system view, and a certificate has been loaded using the certificate
load command in the SSL policy view.
● You have obtained a digital certificate for the SSL policy from an authorized
certificate authority.
Precautions
When there are Portal authentication users online, you cannot disable the built-in
Portal server function or change the SSL policy for the built-in Portal server.
Example
# Enable the built-in Portal server function and configure the server to use the SSL
policy s1.
<HUAWEI> system-view
[HUAWEI] interface loopback 1
[HUAWEI-LoopBack1] ip address 10.1.1.1 24
[HUAWEI-LoopBack1] quit
[HUAWEI] portal local-server ip 10.1.1.1
[HUAWEI] ssl policy s1
[HUAWEI-ssl-policy-s1] quit
[HUAWEI] portal local-server https ssl-policy s1
Function
The portal local-server page-text load command loads the use instruction page
file of the built-in Portal server.
The undo portal local-server page-text load command deletes the loaded use
instruction page file of the built-in Portal server.
By default, no use instruction page file of the built-in Portal server is loaded.
Format
portal local-server page-text load string
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If you need to customize the use instruction page, you can upload the customized
use instruction page file to the device, and run this command to load the file.
After the file is loaded, the hyperlink Instruction for Use is generated on the login
page of the built-in Portal server, and users can click the hyperlink to access the
use instruction page.
Prerequisite
Precautions
When the to-be-loaded page is customized, the page length and width are fixed.
After adjusting the page, the administrator must upload and load the modified
page again.
Currently, only Chinese or English page files can be loaded on the device.
Example
# Load the use instruction page file page.html to the built-in Portal server.
<HUAWEI> system-view
[HUAWEI] portal local-server page-text load flash:/page.html
Info: The loading process may take a few seconds.Please wait for a moment.
Info: Load web file successfully.
Related Topics
13.4.75 display portal local-server
Function
The portal local-server policy-text load command loads a disclaimer page file to
the built-in Portal server.
The undo portal local-server policy-text load command deletes the loaded
disclaimer page file.
Format
portal local-server policy-text load string
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To customize a disclaimer page, upload the disclaimer page file to the device and
run this command to load the file. After the file is loaded, the hyperlink
Disclaimer will be displayed on the login page. You can click the link to visit the
disclaimer page.
Prerequisite
The disclaimer page file to be loaded has been uploaded to the device.
Precautions
Currently, only Chinese and English disclaimer page files can be loaded on the
device.
Example
# Load the disclaimer page file policy.html to the built-in Portal server.
<HUAWEI> system-view
[HUAWEI] portal local-server policy-text load policy.html
Info: The loading process may take a few seconds.Please wait for a moment.
Info: Load web file successfully.
Related Topics
13.4.75 display portal local-server
Format
portal local-server timer session-timeout interval
undo portal local-server timer session-timeout
Parameters
Parameter Description Value
interval Specifies the session timeout The value is an integer that
interval for built-in Portal ranges from 1 to 720, in hours.
authentication users.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Scenario
When built-in Portal authentication is used for users and the device functions as a
built-in Portal server, you can configure the session timeout interval for the users.
The users are disconnected after the specified session timeout interval. To connect
to the network again, the users need to be re-authenticated.
Precautions
The session timeout interval for built-in Portal authentication users is calculated
based on the device time. For example, if the session timeout interval is 6 hours
and the device time is 2014-09-01 02:00:00 when a user was connected, the user
should be disconnected at 2014-09-01 08:00:00. Therefore, ensure that the device
time and time zone are correct after the session timeout interval is configured for
users. If the device time is incorrect, users may fail to be connected or
disconnected properly. You can run the display clock command to check the
device time and the time zone.
Example
# Set the session timeout interval to 10 hours for built-in Portal authentication
users.
<HUAWEI> system-view
[HUAWEI] portal local-server timer session-timeout 10
Related Topics
13.4.75 display portal local-server
Function
The portal local-server syslog-limit enable command enables the log
suppression function for users authenticated through the built-in Portal server.
The undo portal local-server syslog-limit enable command disables the log
suppression function for users authenticated through the built-in Portal server.
By default, the log suppression function is enabled for users authenticated through
the built-in Portal server.
Format
portal local-server syslog-limit enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The device generates logs when users authenticated through the built-in Portal
server fail to go online or offline. If a user fails to go online or offline, the user
attempts to go online or offline repeatedly, and the device generates a large
number of logs within a short time. This results in a high failure rate in the
statistics and degrades the system performance. You can run the portal local-
server syslog-limit enable command to enable the log suppression function for
users authenticated through the built-in Portal server. The device then only
generates one log if a user fails to go online or offline within a suppression period
(configured using the 13.4.159 portal local-server syslog-limit period
command).
Example
# Enable the log suppression function for users authenticated through the built-in
Portal server.
<HUAWEI> system-view
[HUAWEI] portal local-server syslog-limit enable
Format
portal local-server syslog-limit period value
undo portal local-server syslog-limit period
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The device generates logs when users authenticated through the built-in Portal
server fail to go online or offline. If a user fails to go online or offline, the user
attempts to go online or offline repeatedly, and the device generates a large
number of logs within a short time. This results in a high failure rate in the
statistics and degrades the system performance. You can enable the log
suppression function (configured using the 13.4.158 portal local-server syslog-
limit enable command) for users authenticated through the built-in Portal server.
The device then only generates one log if a user fails to go online or offline within
a suppression period.
Example
# Set the log suppression period to 1000 seconds for users authenticated through
the built-in Portal server.
<HUAWEI> system-view
[HUAWEI] portal local-server syslog-limit period 1000
Format
portal logout different-server enable
undo portal logout different-server enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Precautions
The user logout requests that a device can process must be sent by Portal servers
bound to an access interface. These servers include all the Portal servers
configured in the master and backup Portal server templates bound to the
interface.
Example
# Enable a device to process user logout requests a Portal server other than the
one from which users log in.
<HUAWEI> system-view
[HUAWEI] portal logout different-server enable
Related Topics
13.4.73 display portal
Function
The portal logout resend timeout command configures the re-transmission times
and interval for the Portal authentication user logout packet.
The undo portal logout resend timeout command restores the default setting.
Format
portal logout resend times timeout period
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After disconnecting a Portal authentication user, the device sends a user logout
packet (NTF-LOGOUT) to instruct the Portal server to delete the user information.
If the network between the device and Portal server is not stable or packets are
lost, the Portal server may fail to receive the user logout packet from the device
after the Portal authentication user is disconnected. In this case, the user is
displayed as disconnected on the device but still as online on the Portal server. To
enable the Portal server to receive the user logout packet and ensure that the
online user information on the Portal server is correct, the administrator can
enable the user logout packet re-transmission function on the device and
configure the re-transmission times and interval.
Example
# Configure the re-transmission times to 5 and interval to 10 seconds for the
Portal authentication user logout packet.
<HUAWEI> system-view
[HUAWEI] portal logout resend 5 timeout 10
Related Topics
13.4.73 display portal
13.4.80 display portal user-logout
Format
portal max-user user-number
undo portal max-user
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
You can run the portal max-user command to set the maximum number of
concurrent Portal authentication users.
Example
# Set the maximum number of concurrent Portal authentication users to 25.
<HUAWEI> system-view
[HUAWEI] portal max-user 25
The undo portal quiet-period command disables the quiet timer of Portal
authentication.
By default, the quiet timer for Portal authentication is enabled.
Format
portal quiet-period
undo portal quiet-period
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After the portal quiet-period command is used to enable the quiet timer for
Portal authentication. If the number of Portal authentication failures exceeds the
value specified by the 13.4.164 portal quiet-times command, the device keeps
the Portal authentication user in quiet state for a period of time. During the quiet
period, the device discards Portal authentication requests from the user. This
prevents the impact of frequent authentications on the system.
The quiet period for Portal authentication can be set using the 13.4.165 portal
timer quiet-period command. After the quiet period is reached, the device re-
authenticates the user.
Example
# Enable the quiet timer for Portal authentication.
<HUAWEI> system-view
[HUAWEI] portal quiet-period
Format
portal quiet-times fail-times
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After the 13.4.163 portal quiet-period command is used to enable the quiet
timer, if the number of Portal authentication failures exceeds the value specified
by the portal quiet-times command, the device keeps the Portal authentication
user in quiet state for a period of time. This prevents the impact of frequent
authentications on the system.
Example
# Set the maximum number of Portal authentication failures within 60 seconds to
4.
<HUAWEI> system-view
[HUAWEI] portal quiet-times 4
Function
The portal timer quiet-period command configures the quiet period for Portal
authentication users who fail to be authenticated.
The undo portal timer quiet-period command restores the default quiet period.
By default, the quiet period is 60 seconds for Portal authentication users who fail
to be authenticated.
Format
portal timer quiet-period quiet-period-value
undo portal timer quiet-period
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
If a Portal authentication user fails to be authenticated consecutively within a
short period, the system is affected and a large number of duplicated
authentication failure logs are generated.
After the quiet function is enabled using the 13.4.163 portal quiet-period
command, if the number of times that a Portal authentication user fails to be
authenticated within 60s exceeds the upper limit (configured using the 13.4.164
portal quiet-times command), the device discards the user's Portal authentication
request packets for a period to avoid frequent authentication failures.
Example
# Set the quiet period to 100 seconds for Portal authentication users who fail to
be authenticated.
<HUAWEI> system-view
[HUAWEI] portal timer quiet-period 100
Format
portal timer offline-detect time-length
Parameters
Parameter Description Value
time-length Specifies the Portal The value is 0 or an integer that ranges from
user offline detection 30 to 7200, in seconds. The default value is
interval. 300.
The value 0 indicates that offline detection is
not performed.
Views
Portal access profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If a Portal user goes offline due to power failure or network interruption, the
device and Portal server may still store the user information, which causes
incorrect accounting. Additionally, a limit number of users can access the device. If
a user goes offline improperly but the device still stores user information, other
users cannot access the network.
After the Portal user offline detection interval is set, if the user does not respond
within the interval, the device considers the Portal user offline. The device and
Portal server then delete the user information and release resources to ensure an
efficient resource use.
Precautions
If the number of offline detection packets (ARP packets) exceeds the default CAR
value, the detection fails and the users are logged out (The display cpu-defend
statistics command can be run to check whether ARP request and response
packets are lost.). To resolve the problem, the following methods are
recommended:
● Increase the detection interval based on the number of users. The default
detection interval is recommended when there are less than 8000 users; the
detection interval should be no less than 600 seconds when there are more
than 8000 users.
● Deploy the port attack defense function on the access device and limit the
rate of packets sent to the CPU.
If user traffic (such as service packets) passes through the device within the Portal
user offline detection period, the device does not consider the user offline even if
the user does not respond.
Example
# In the Portal access profile p1, set the offline detection interval of Portal
authentication users to 400s.
<HUAWEI> system-view
[HUAWEI] portal-access-profile name p1
[HUAWEI-portal-acces-profile-p1] portal timer offline-detect 400
Function
The portal url-encode enable command enables URL encoding and decoding.
The undo portal url-encode enable command disables URL encoding and
decoding.
NOTE
Format
portal url-encode enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To improve web application security, data from untrustworthy sources must be
encoded before being sent to clients. URL encoding is most commonly used in web
applications. To enable URL encoding and decoding, run the portal url-encode
enable command. Some special characters in redirected URLs are then converted
to secure formats, preventing clients from mistaking them for syntax signs or
instructions and unexpectedly modifying the original syntax. In this way, cross-site
scripting attacks and injection attacks are prevented.
Precautions
After the URL encoding and decoding function is enabled, some servers may not
support the escape characters converted from special characters in redirect URLs.
Therefore, check whether servers support the escape characters before configuring
special characters in redirect URLs.
Example
# Enable URL encoding and decoding.
<HUAWEI> system-view
[HUAWEI] portal url-encode enable
Related Topics
13.4.79 display portal url-encode configuration
Format
portal user-alarm percentage percent-lower-value percent-upper-value
undo portal user-alarm percentage
Parameters
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After running the 13.4.162 portal max-user command to set the maximum
number of online Portal authentication users allowed on a device, you can run the
portal user-alarm percentage command to set alarm thresholds for the Portal
authentication user count percentage.
When the percentage of online Portal authentication users against the maximum
number of users allowed by the device exceeds the upper alarm threshold, the
device generates an alarm. When the percentage of online Portal authentication
users against the maximum number of users allowed by the device reaches or falls
below the lower alarm threshold later, the device generates a clear alarm.
If the configured upper alarm threshold for the Portal authentication user count
percentage is 100, the device generates an alarm when the number of online users
reaches the maximum number of users allowed by the device.
Example
# Set the lower alarm threshold for the Portal authentication user count
percentage to 30, and the upper alarm threshold for the Portal authentication
user count percentage to 80.
<HUAWEI> system-view
[HUAWEI] portal user-alarm percentage 30 80
Related Topics
13.4.162 portal max-user
Format
portal web-authen-server { http | https ssl-policy policy-name } [ port port-
number ]
undo portal web-authen-server [ port ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If the device is connected to the Portal server that only supports the HTTP or
HTTPS protocol, you need to run the portal web-authen-server command on the
device to enable the Portal interconnection function of the HTTP or HTTPS
protocol.
Follow-up Procedure
Run the 13.4.172 protocol (Portal server template view) command to set the
protocol used in Portal authentication to HTTP or HTTPS.
Precautions
Modifying the port parameter causes the pre-connected user to go offline.
Example
# Enable the Portal interconnection function of the HTTPS protocol.
<HUAWEI> system-view
[HUAWEI] ssl policy huawei
[HUAWEI-ssl-policy-huawei] quit
[HUAWEI] portal web-authen-server https ssl-policy huawei port 8443
Related Topics
13.4.89 display web-auth-server configuration
Format
portal-access-profile access-profile-name
undo portal-access-profile
Parameters
Parameter Description Value
Views
Authentication profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Prerequisites
The Portal server has been configured for the Portal access profile:
● If the external Portal server is used, the Portal server profile used by the
Portal access profile has been configured using the 13.4.209 web-auth-server
(Portal access profile view) command.
● If the built-in Portal server is used, the built-in Portal server function of the
Portal access profile has been enabled using the 13.4.149 portal local-server
enable command.
Follow-up Procedure
Precautions
Example
# Bind the authentication profile portal_authen_profile1 to the Portal access
profile portal_access_profile1. The IP address of the Portal server is 192.168.10.1,
and Layer 2 Portal authentication is used.
<HUAWEI> system-view
[HUAWEI] web-auth-server server1
[HUAWEI-web-auth-server-server1] server-ip 192.168.10.1
[HUAWEI-web-auth-server-server1] quit
[HUAWEI] portal-access-profile name portal_access_profile1
[HUAWEI-portal-acces-profile-portal_access_profile1] web-auth-server server1 direct
[HUAWEI-portal-acces-profile-portal_access_profile1] quit
[HUAWEI] authentication-profile name portal_authen_profile1
[HUAWEI-authen-profile-portal_authen_profile1] portal-access-profile portal_access_profile1
Related Topics
13.4.61 display authentication-profile configuration
Function
The portal-access-profile command creates a portal access profile and displays
the portal access profile view.
Format
portal-access-profile name access-profile-name
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The device uses portal access profiles to uniformly manage all portal users access
configurations. To perform portal authentication for the users in an interface or
VAP profile, bind the authentication profile applied to the interface or VAP profile
to a portal access profile.
Follow-up Procedure
Precautions
Example
# Create portal access profile named portal_access_profile1.
<HUAWEI> system-view
[HUAWEI] portal-access-profile name portal_access_profile1
Related Topics
13.4.77 display portal-access-profile configuration
Function
The protocol command configures the protocol used in Portal authentication.
Format
protocol { http [ password-encrypt { none | uam } ] | portal }
undo protocol
Parameters
Parameter Description Value
Views
Portal server template view
Default Level
2: Configuration level
Usage Guidelines
In Portal authentication, the device can use the following protocols to
communicate with the Portal server. You can set the protocol according to the
protocol supported by the Portal server.
● Portal protocol
● HTTP or HTTPS protocol
Example
# Set the protocol used in Portal authentication to HTTP or HTTPS.
<HUAWEI> system-view
[HUAWEI] web-auth-server abc
[HUAWEI-web-auth-server-abc] protocol http password-encrypt uam
Function
The qos-profile command binds a QoS profile to a service scheme.
The undo qos-profile command unbinds the QoS profile from the service scheme.
NOTE
Format
qos-profile profile-name
Parameters
Parameter Description Value
profile-name Specifies the name of the QoS The value must be the name
profile bound to the service scheme. of an existing QoS profile.
Views
Service scheme view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
After creating a service scheme using the 13.1.82 service-scheme (AAA view)
command, you can run the qos-profile command to bind a QoS profile to the
service scheme. The user assigned with the service scheme will have the attributes
in the QoS profile.
Precautions
For S5720EI, S6720EI, and S6720S-EI, if the user upstream rate limit is configured
in the QoS profile bound to a service scheme, do not configure the device to use
the service scheme to grant network access rights to users in the pre-connection
phase. Otherwise, users go offline.
The authorized downlink bandwidth limit delivered by the server has a low
priority, and will not take effect when it is configured together with an
authorization QoS attribute.
Example
# Bind the QoS profile abc to the service scheme huawei.
<HUAWEI> system-view
[HUAWEI] qos-profile name abc
[HUAWEI-qos-abc] quit
[HUAWEI] aaa
[HUAWEI-aaa] service-scheme huawei
[HUAWEI-aaa-service-huawei] qos-profile abc
Function
The reset aaa statistics access-type-authenreq command clears the number of
requesting for MAC, Portal, or 802.1X authentication.
Format
reset aaa statistics access-type-authenreq
Parameters
None
Views
All views
Default Level
3: Management level
Usage Guidelines
When users send authentication requests, the device collects statistics on the
number of initiating MAC, Portal, and 802.1X authentications.
To clear the number of requesting for MAC, Portal, or 802.1X authentication, run
the reset aaa statistics access-type-authenreq command.
Example
# Clear the number of requesting for MAC, Portal, or 802.1X authentication.
<HUAWEI> reset aaa statistics access-type-authenreq
Format
reset dot1x statistics [ interface { interface-type interface-number1 [ to
interface-number2 ] } &<1-10> ]
Parameters
Parameter Description Value
Views
User view
Default Level
3: Management level
Usage Guidelines
The 802.1X authentication statistics contain the number of times that the
authentication succeeded and failed and the number of sent and received packets.
Example
# Clear 802.1X authentication statistics.
<HUAWEI> reset dot1x statistics
Related Topics
13.4.63 display dot1x
Function
The reset mac-authen statistics command clears MAC address authentication
statistics.
Format
reset mac-authen statistics [ interface { interface-type interface-number1 [ to
interface-number2 ] } &<1-10> ]
Parameters
Parameter Description Value
Views
User view
Default Level
3: Management level
Usage Guidelines
The reset mac-authen statistics command is used in the following scenarios:
● Re-deploy services. After the statistics are cleared, collect the MAC address
authentication statistics again, and run the 13.4.71 display mac-authen
command to check whether the authentication function is normal.
● Rectify a fault. After the fault is rectified, run the reset mac-authen statistics
command to clear statistics, collect MAC address authentication statistics
again, and run the 13.4.71 display mac-authen command to check the
authentication result. If the authentication is successful, the fault is rectified.
Example
# Clear MAC address authentication statistics.
<HUAWEI> reset mac-authen statistics
Related Topics
13.4.71 display mac-authen
NOTE
Format
reset access-user dot1x-identity statistics
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
To display statistics about Identity packets for wireless 802.1X authentication on a
switch within a specified period of time, run the reset access-user dot1x-identity
statistics command to clear the existing statistics first, and then run the 13.4.54
display access-user dot1x-identity statistics command to display the new
statistics.
Example
# Clear statistics about Identity packets for wireless 802.1X authentication on the
switch.
<HUAWEI> system-view
[HUAWEI] reset access-user dot1x-identity statistics
Function
The reset access-user traffic-statistics command clears statistics on traffic of
users.
NOTE
Only the S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
reset access-user traffic-statistics { user-id begin-id [ end-id ] | mac-address
mac-address | ip-address ip-address [ vpn-instance vpn-instance ] }
Parameters
Parameter Description Value
user-id begin-id Specifies IDs of online users. The value is an integer that
[ end-id ] varies depending on the
● begin-id: indicates the ID of product model.
the start user.
● end-id: indicates the ID of
the end user. The value of
end-id must be equal to or
greater than that of begin-id.
mac-address Specifies the MAC address of an The value is in the format
mac-address online user. of H-H-H, in which H is a
hexadecimal number of 1
to 4 digits.
Views
User view
Default Level
3: Management level
Usage Guidelines
After traffic policing is configured in a service scheme, the device collects traffic
statistics for the users assigned with the service scheme. You can run the reset
access-user traffic-statistics command to clear traffic statistics of online users.
Example
# Clear statistics on traffic of the user with the IP address 10.1.1.1.
<HUAWEI> reset access-user traffic-statistics ip-address 10.1.1.1
NOTE
Format
rule rule-id { mac mac-address mask { mask-length | mask } | dhcp-option
option-id { sub-match | all-match } { ascii option-text | hex option-hex-string } |
user-agent { sub-match | all-match } user-agent-text }
undo rule rule-id
Parameters
Parameter Description Value
mask { mask- Indicates the mask or mask length of a The value of mask is
length | terminal MAC address. in H-H-H format.
mask } An H is a
hexadecimal
number of 4 digits.
The value of mask-
length is an integer
that ranges from 1
to 48.
hex option- Specifies the Option information that a The value is a string
hex-string terminal must match as a hexadecimal of 1 to 254 case-
string. insensitive
characters without
spaces.
Views
Terminal type identification profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A terminal type identification rule is set based on the terminal's MAC address, UA,
and DHCP Option information.
● Match the first 24 bits of a terminal's MAC address, which is known as the
Organizationally Unique Identifier (OUI), to identify the corresponding
manufacturer.
● Use the UA information carried in HTTP packets from a terminal to identify
the operating system and its version, the CPU type, browser type, and browser
version.
● Use the manufacturer information carried in Option12, Option55, and
Option60 in DHCP packets from a terminal to identify the terminal's host
name and manufacturer type.
A terminal type can be identified by checking whether the terminal information
matches the identification rule configured. Once the identification is performed,
user rights can be delivered or access control can be implemented based on
terminal types.
Precautions
● To match an identification rule, the terminal information must be the same
with all the configuration items in the rule.
● If the specified rule-id already exists and the new rule conflicts with the
original rule, the new rule replaces the original one in the conflicting part,
which is the same as editing an existing rule.
● To modify a rule that already contains rule-id, delete the old rule and create a
rule. Otherwise, the configuration result may be incorrect.
Example
# Configure terminal type identification rule 1 in the terminal type identification
profile huawei.
<HUAWEI> system-view
[HUAWEI] device-profile profile-name huawei
[HUAWEI-device-profile-huawei] rule 1 mac 0046-4b59-1ee0 mask 12
Related Topics
13.4.62 display device-profile
13.4.180 server-detect
Function
The server-detect command enables the Portal server detection function.
The undo server-detect command disables the Portal server detection function.
Format
server-detect [ interval interval-period | max-times times | critical-num critical-
num | action { log | trap } * ] *
Parameters
Parameter Description Value
Views
Portal server profile view
Default Level
2: Configuration level
Usage Guidelines
If the communication is interrupted because the network between the device and
Portal server is faulty or the Portal server is faulty, new Portal authentication users
cannot go online. This brings great inconvenience to users.
After the Portal server detection function is enabled in the Portal server profile,
the device detects all Portal servers configured in the Portal server profile. If the
number of times that the device fails to detect a Portal server exceeds the upper
limit, the status of the Portal server is changed from Up to Down. If the number of
Portal servers in Up state is less than or equal to the minimum number (specified
by the critical-num parameter), the device performs the corresponding operation
to allow the administrator to obtain the real-time Portal server status or ensure
that the users have certain network access rights.
NOTE
The detection interval of the Portal server multiplied by the maximum number of detection
failures cannot be less than the keepalive heartbeat interval of the Portal server. It is
recommended that the configured detection interval of the Portal server be greater than
the keepalive heartbeat interval of the Portal server.
Example
# Enable the Portal server detection and keepalive function in the Portal server
profile abc, set the detection interval to 100s, set the maximum number of failures
to 5, and specify the log sent after the number of failures exceeds the limit.
<HUAWEI> system-view
[HUAWEI] web-auth-server abc
[HUAWEI-web-auth-server-abc] server-detect interval 100 max-times 5 action log
Related Topics
13.4.202 user-sync
Function
The server-ip command configures an IP address for a Portal server.
Format
server-ip server-ip-address &<1-10>
Parameters
Parameter Description Value
server-ip-address Specifies an IP address of a Portal The value is in dotted
server. decimal notation.
all Deletes all IP addresses of a Portal -
server.
Views
Portal server profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After creating a Portal server profile on the device using the 13.4.211 web-auth-
server (system view) command, configure parameters for the template.
Run the server-ip command to configure an IP address for the Portal server in the
Portal server profile view. When receiving a Portal authentication request packet
from a user, the device sends a response packet to the Portal server with the
configured IP address. Multiple IP addresses can be configured in a Portal server
profile. This configuration allows Portal authentication users to access the same
Portal authentication page using multiple IP addresses, making the authentication
process more flexible.
Precautions
● After the IP address corresponding to a Portal server is configured in the
Portal server profile, users are allowed to access the IP address.
● If multiple IP addresses are configured for a Portal server in the Portal server
profile, you are advised to run the 13.4.197 url (Portal server profile view)
command to configure a URL for the Portal server. If no URL is configured, the
device uses the first IP address as the URL by default, and the other IP
addresses do not take effect. When the switch functions as the AC, server IP
addresses are automatically delivered to the AP and authentication-free rules
are generated. Currently, only four server IP addresses take effect on the AP.
Example
# Set the Portal server IP address in the Portal server profile huawei to 10.10.10.1.
<HUAWEI> system-view
[HUAWEI] web-auth-server huawei
[HUAWEI-web-auth-server-huawei] server-ip 10.10.10.1
Related Topics
13.4.89 display web-auth-server configuration
Function
The shared-key command configures the shared key that the device uses to
exchange information with a Portal server.
By default, no shared key that the device uses to exchange information with a
Portal server is configured.
Format
shared-key cipher key-string
undo shared-key
Parameters
Parameter Description Value
cipher Displays a shared key -
in cipher text.
Views
Portal server profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a shared key is configured using the shared-key command, the Portal packet
exchanged between the device and Portal server carries an authenticator
generated according to the shared key, and the authenticator is used to check
whether the Portal packet at the receiver is correct. This effectively improves the
information exchange security.
Precautions
For security purposes, it is recommended that the password contains at least two
types of lower-case letters, upper-case letters, numerals, and special characters,
and contains at least 6 characters.
Example
# Configure the shared key in the Portal server profile huawei to huawei@123.
<HUAWEI> system-view
[HUAWEI] web-auth-server huawei
[HUAWEI-web-auth-server-huawei] shared-key cipher huawei@123
Related Topics
13.4.89 display web-auth-server configuration
Format
source-ip ip-address
undo source-ip
Parameters
Parameter Description Value
ip-address Specifies the source IP address for The value is in dotted
communication with a Portal server. decimal notation.
Views
Portal server profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To ensure normal communication between the device and Portal server, run the
source-ip command to configure a source IP address on the device.
Example
# Set the source IP address for communication between the device and a Portal
server to 192.168.1.100 in the Portal server profile huawei.
<HUAWEI> system-view
[HUAWEI] web-auth-server huawei
[HUAWEI-web-auth-server-huawei] source-ip 192.168.1.100
Function
The source-interface command configures an IP address of a specified interface
as the source IP address used by the device to communicate with the Portal server.
The undo source interface command restores the default configuration.
By default, no source IP address is configured for the device.
Format
source-interface interface-type interface-number
undo source-interface
Parameters
Parameter Description Value
interface-type Configures an IP address of a specified interface as the -
interface- source IP address used by the device to communicate
number with the Portal server:
● interface-type specifies the interface type.
NOTE
The interface must be a loopback interface.
● interface-number specifies the interface number.
Views
Portal server template view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To enable the device to communicate with the Portal server normally, ensure that
the source IP address in the packets sent by the device to the Portal server is
consistent with the device IP address configured on the Portal server. By default,
the device uses the IP address of an outbound interface as the source IP address to
communicate with the Portal server. When there are multiple outbound interfaces
and the outbound interface sending packets changes, the source IP address in the
packets sent by the device to the Portal server becomes inconsistent with the
device IP address configured on the Portal server. In this situation, communication
between the device and Portal server is interrupted. To address this problem, run
the source-interface command on the device to specify the IP address of a
loopback interface as the source IP address used by the device to communicate
with the Portal server.
Precautions
Example
# Configure an IP address of a specified interface as the source IP address used by
the device to communicate with the Portal server.
<HUAWEI> system-view
[HUAWEI] interface loopback 1
[HUAWEI-LoopBack1] ip address 10.1.2.25 24
[HUAWEI-LoopBack1] quit
[HUAWEI] web-auth-server huawei
[HUAWEI-web-auth-server-huawei] source-interface loopback 1
13.4.185 static-user
Function
The static-user command configures a static user.
Format
static-user start-ip-address [ end-ip-address ] [ vpn-instance vpn-instance-
name ] [ ip-user ] [ domain-name domain-name | interface interface-type
interface-number [ detect ] | mac-address mac-address | vlan vlan-id ] *
undo static-user start-ip-address [ end-ip-address ] [ vpn-instance vpn-instance-
name ]
NOTE
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In network deployment, static IP addresses are assigned to dumb terminals such
as printers and servers. These users can be configured as static users for flexible
authentication.
After static users are configured, the device can use static user information such as
their IP addresses as the user names to authenticate the users only if one of the
802.1X authentication, MAC address authentication, and Portal authentication
modes is enabled on the interfaces connected to the static users.
When ip-user is specified, IP addresses are used to identify static users and control
their permission.
● When some terminals have multiple IP addresses and one MAC address, and
they can access the network only after each IP address is authenticated,
specify the ip-user parameter to identify these users and configure the ip-
static-user enable command in the authentication template bound to the
user access interfaces.
● When all terminals have multiple IP addresses and can access the network
only after each IP address is authenticated, only configure the ip-static-user
enable command in the authentication template bound to the user access
interfaces.
Precautions
When the interface (interface interface-type interface-number) mapping static
users is specified, the VLAN (vlan vlan-id) to which the interface belongs must be
configured.
This function takes effect only for users who go online after this function is
successfully configured.
Static users are not allowed to update the IP address, otherwise the users will go
offline.
Only when static users have the ip-user parameter configured and connect to the
interfaces bound to the authentication template in which the ip-static-user
enable command configured, IP addresses can be used to identify these users and
control their permission.
After this command is configured to specify the VLAN to which a static user
belongs, and the user is authenticated and the VLAN is authorized, if the
authorized VLAN is different from the previously specified VLAN, the user is added
to the new authorized VLAN and is no longer a static user.
When the command is configured on the UC device and directly delivered to the
ASs in the SVF scenario, the command must be in the following format: static-
user start-ip-address [ end-ip-address ] { vlan vlan-id | mac-address mac-
address } or static-user start-ip-address [ end-ip-address ] vlan vlan-id mac-
address mac-address.
Example
# Configure the IP address range of 10.1.1.1 to 10.1.1.10, authentication domain
huawei, and VLAN 10 for static users.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] domain huawei
[HUAWEI-aaa-domain-huawei] quit
[HUAWEI-aaa] quit
[HUAWEI] static-user 10.1.1.1 10.1.1.10 domain-name huawei vlan 10
Related Topics
13.4.187 static-user username format-include
13.4.186 static-user password
13.4.82 display static-user
Format
static-user password cipher password
undo static-user password
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a static user triggers authentication through an ARP packet, you can run
the static-user password command to set the password for the static user. The
access device then sends the password to the authentication server.
Precautions
To improve security, change the default password immediately and update the
password periodically. It is recommended that the new password contains at least
two types of lower-case letters, upper-case letters, numerals, and special
characters, and contains at least 6 characters.
This function takes effect only for users who go online after this function is
successfully configured.
Example
# Set huawei@123 as the static user password for authentication.
<HUAWEI> system-view
[HUAWEI] static-user password cipher huawei@123
Related Topics
13.4.185 static-user
13.4.187 static-user username format-include
13.4.82 display static-user
Format
static-user username format-include { ip-address | mac-address | system-
name }
undo static-user username format-include
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When a static user triggers authentication through an ARP packet, you can run
the static-user username format-include command to set the user name for the
static user. The access device then sends the user name to the authentication
server.
NOTE
If the user name of a static user contains a device name whose length exceeds 16 bytes, the
system uses only the first 16 bytes of the device name.
This function takes effect only for users who go online after this function is successfully
configured.
Example
# Set the user IP address as the static user name for authentication.
<HUAWEI> system-view
[HUAWEI] static-user username format-include ip-address
Related Topics
13.4.185 static-user
13.4.186 static-user password
13.4.82 display static-user
Function
The snmp-agent trap enable feature-name mid_aaa command enables the trap
function for the AAA module.
Format
snmp-agent trap enable feature-name mid_aaa [ trap-name
{ hwmacmovedquietmaxuseralarm | hwmacmovedquietuserclearalarm } ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After the trap function is enabled, the device generates traps during operation and
sends the traps to the NMS through the SNMP module. If the trap function is
disabled, the device does not generate traps and the SNMP module does not send
traps to the NMS.
You can specify trap-name to enable the trap function for one or more events.
Example
# Enable the trap function for hwmacmovedquietmaxuseralarm of the AAA
module.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name mid_aaa trap-name
hwmacmovedquietmaxuseralarm
Related Topics
13.4.86 display snmp-agent trap feature-name mid_aaa all
Function
The snmp-agent trap enable feature-name mid_eapol command enables the
trap function for the DOT1X module.
Format
snmp-agent trap enable feature-name mid_eapol [ trap-name
{ hwmacauthenmaxuseralarm | hwsrvcfgeapmaxuseralarm } ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After the trap function is enabled, the device generates traps during operation and
sends the traps to the NMS through the SNMP module. If the trap function is
disabled, the device does not generate traps and the SNMP module does not send
traps to the NMS.
You can specify trap-name to enable the trap function for one or more events.
Example
# Enable the trap function for hwmacauthenmaxuseralarm of the DOT1X module.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name mid_eapol trap-name hwmacauthenmaxuseralarm
Related Topics
13.4.87 display snmp-agent trap feature-name mid_eapol all
Function
The snmp-agent trap enable feature-name mid_web command enables the trap
function for the web authentication module.
By default, the trap function is enabled for the web authentication module.
Format
snmp-agent trap enable feature-name mid_web [ trap-name
{ hwportalmaxuseralarm | hwportaluserclearalarm | hwportalserverdown |
hwportalserverup } ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After the trap function is enabled, the device generates traps during operation and
sends the traps to the NMS through the SNMP module. If the trap function is
disabled, the device does not generate traps and the SNMP module does not send
traps to the NMS.
You can specify trap-name to enable the trap function for one or more events.
Example
# Enable the trap function for hwportalmaxuseralarm of the web authentication
module.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name mid_web trap-name hwportalmaxuseralarm
Related Topics
13.4.88 display snmp-agent trap feature-name mid_web all
Function
The traffic-filter acl command configures ACL-based packet filtering.
The undo traffic-filter acl command deletes the ACL configured for packet
filtering.
NOTE
This command is supported only by the S5720EI, S5720HI, S6720EI, and S6720S-EI.
Format
traffic-filter inbound acl { acl-number | name acl-name }
undo traffic-filter inbound acl { acl-number | name acl-name }
Parameters
Parameter Description Value
inbound Configures packet filtering in the inbound -
direction of the interface.
acl-number Specifies the ID of the user ACL configured The user ACL must
for packet filtering. exist.
name acl-name Specifies the name of the user ACL The user ACL must
configured for packet filtering. exist.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In NAC network deployment, you can run the 13.4.195 ucl-group command to
classify users and configure user ACL rules numbered from 6000 to 9999. You can
then implement intra-group isolation (users in a group cannot communicate with
each other) and inter-group isolation (users in the user group cannot
communicate with users in other user groups.), and control network access rights
based on the UCL group.
After configuring ACL rules 6000 to 9999, you must run the traffic-filter acl
command to configure ACL-based packet filtering. The ACL rules then can take
effect for the users in the UCL group.
Precautions
If the user ACL specified in the traffic-filter inbound acl command or the user
ACL delivered by the authentication server is incorrectly configured to block all
user traffic, the switch cannot be connected and network-side protocols such as
OSPF and BGP are interrupted.
Example
# Configure the device to filter the packets in the inbound direction of the
interface based on ACL 6001.
<HUAWEI> system-view
[HUAWEI] traffic-filter inbound acl 6001
Related Topics
13.4.195 ucl-group
14.1.5 acl (system view)
14.1.22 rule (user ACL view)
Function
The traffic-redirect acl command configures ACL-based packet redirection.
The undo traffic-redirect acl command deletes the ACL configured for packet
redirection.
NOTE
This command is supported only by the S5720EI, S5720HI, S6720EI, and S6720S-EI.
Format
traffic-redirect inbound acl { acl-number | name acl-name } [ vpn-instance vpn-
instance-name ] ip-nexthop nexthop-address
Parameters
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In NAC network deployment, you can run the 13.4.195 ucl-group command to
classify users and configure user ACL rules numbered from 6000 to 9999. You can
then implement intra-group isolation (users in a group cannot communicate with
each other) and inter-group isolation (users in the user group cannot
communicate with users in other user groups.), and control network access rights
based on the UCL group.
After configuring ACL rules 6000 to 9999, you can run the traffic-redirect acl
command to configure ACL-based packet redirection. The ACL rules then can take
effect for the users in the UCL group.
When the traffic-redirect command and the traffic-filter acl command are used
simultaneously, and the two commands are associated with the same ACL rule:
● If the deny action is configured in the ACL rule, traffic is discarded.
● If the permit action is configured in the ACL rule, traffic is redirected.
Precautions
Example
# Configure the device to redirect the packets in the inbound direction of the
interface based on ACL 6001.
<HUAWEI> system-view
[HUAWEI] traffic-redirect inbound acl 6001 ip-nexthop 192.168.1.1
Related Topics
13.4.195 ucl-group
14.1.5 acl (system view)
14.1.22 rule (user ACL view)
NOTE
This command is supported only by the S5720EI, S5720HI, S6720EI, and S6720S-EI.
Format
ucl-group { group-index | name group-name }
undo ucl-group
Parameters
Parameter Description Value
group-index Specifies the index of a UCL group. The UCL group must
exist.
name group-name Specifies the name of a UCL group. The UCL group must
exist.
Views
Service scheme view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
After creating a service scheme using the 13.1.82 service-scheme (AAA view)
command, you can run the ucl-group command to bind a UCL group to the
service scheme. The user assigned with the service scheme will have the functions
of the UCL group.
Prerequisites
A UCL group has been created using the 13.4.195 ucl-group command.
Example
# Bind the UCL group abc to the service scheme huawei.
<HUAWEI> system-view
[HUAWEI] ucl-group 10 name abc
[HUAWEI] aaa
[HUAWEI-aaa] service-scheme huawei
[HUAWEI-aaa-service-huawei] ucl-group name abc
Related Topics
13.1.82 service-scheme (AAA view)
13.4.194 ucl-group ip
Function
The ucl-group ip command configures a static UCL group. The static UCL group is
also called the static resource group.
The undo ucl-group ip command deletes the configured static UCL group.
By default, no static UCL group is configured.
NOTE
The static UCL group is only supported by S5720EI, S5720HI, S6720EI, and S6720S-EI.
Format
ucl-group ip ip-address { mask-length | ip-mask } { group-index | name group-
name }
undo ucl-group ip { ip-address { mask-length | ip-mask } | group-index | name
group-name | all }
Parameters
Parameter Description Value
ip-address Specifies the IP address of a The value is in dotted decimal
static UCL group. notation.
NOTE
You can specify the IP address
configured for the local device.
name group- Specifies the name of a static The value must be an existing
name UCL group. UCL group name on the
device.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a static UCL group is created for a resource server, the user access policies
can be managed based on the static UCL group to simplify network deployment.
Prerequisites
A UCL group has been created using the 13.4.195 ucl-group command.
Precautions
In the agile network ubiquitous service solution, this command does not need to
be run on the device, and it is configured on the controller and delivered to the
device.
UCL groups do not support IP address overlapping. The device cannot allocate
users or resources with the same IP addresses in different VPNs to different UCL
groups, and can only allocate these users or resources to the same UCL group.
Example
# Configure the static UCL group named email with the IP address 10.1.1.1/24.
<HUAWEI> system-view
[HUAWEI] ucl-group 1 name email
[HUAWEI] ucl-group ip 10.1.1.1 24 name email
13.4.195 ucl-group
Function
The ucl-group command creates a UCL group.
The undo ucl-group command deletes the configured UCL group.
By default, no UCL group is created.
NOTE
UCL group is only supported by the S5720EI, S5720HI, S6720EI, and S6720S-EI.
Format
ucl-group group-index [ name group-name ]
undo ucl-group { all | group-index | name group-name }
Parameters
Param Description Value
eter
group- Specifies the The value is an integer that ranges from 1 to 48 for
index index of a S5720EI, S6720EI, and S6720S-EI, and from 1 to 64000
UCL group. for S5720HI.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In NAC network deployment, there are a large number of users and each user
may be configured with many ACL rules. The ACL resources on the device are
limited and therefore are insufficient to meet the demand of each user. If ACL
rules are independently deployed for each user, the workload is heavy.
In actual NAC application, there are a large number of access users but the user
types (users of a type have the same network access rights) are limited. The users
can be classified using UCL groups (identify user types), and a group of ACL
groups are deployed for users of the same type.
After you create UCL groups on the device and configure a UCL group for a user
on the authentication server, the authentication server delivers the user's UCL
group to the device when authenticating the user. In this way, the device obtains
the mapping between users and UCL groups, and accordingly adds users to
different UCL groups so that the users in each group can share the same ACL
rules.
Follow-up Procedure
A UCL group only identifies a user type and does not control users' network access
rights. To control the network access rights, you must first configure ACL rules
numbered from 6000 to 9999 and then configure ACL-based packet filtering.
1. Run the 14.1.5 acl (system view) command to create an ACL with the
number range of 6000 to 9999.
2. Run the 14.1.22 rule (user ACL view) to create rules for the ACL.
3. Run the 13.4.191 traffic-filter acl command to configure ACL-based packet
filtering.
Precautions
Example
# Create a UCL group named abc with the group ID 10.
<HUAWEI> system-view
[HUAWEI] ucl-group 10 name abc
Related Topics
14.1.5 acl (system view)
14.1.22 rule (user ACL view)
13.4.191 traffic-filter acl
Function
The url command configures the redirection URL or pushed URL.
The undo url command cancels the redirection URL or pushed URL.
Format
url [ push-only | redirect-only ] url-string [ ssid ssid ]
NOTE
Parameters
Parameter Description Value
ssid ssid Specifies the SSID that users associate The SSID must
with. already exist.
This parameter is only valid for wireless
access users. The SSID that users
associate with must be the same as that
configured on the device; otherwise, the
device cannot push URLs to users.
Views
URL template view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a URL template is created using the 13.4.200 url-template name command,
you can run this command to configure the redirection URL or pushed URL. The
difference between redirection URL and pushed URL is as follows.
● Redirection URL: When a user without network access right connects to the
network, the Portal authentication device redirects the user to the redirection
URL for authentication.
● Pushed URL: After an authenticated user accesses the network through web
for the first time, the access device pushes the web page corresponding to the
URL to the user. The web access request from the user is redirected to the
specified URL, and then the user is allowed to access network resources.
When configuring a URL on the device, you cannot enter a question mark (?). If a
URL contains a question mark (?), you can run the parameter start-mark #
command in the URL template view to replace the question mark (?) with the
number sign (#).
Precautions
If the push-only and redirect-only parameters are not specified, the configured
URL is used as both redirection URL and pushed URL. You can configure pushed
URL using the 13.4.119 force-push command, or use the 13.4.201 url-template
(Portal server profile view) command to bind a URL template to the Portal
server profile to configure redirection URL.
Example
# Set the redirection URL to http://10.1.1.1.
<HUAWEI> system-view
[HUAWEI] url-template name huawei
[HUAWEI-url-template-huawei] url http://10.1.1.1
Function
The url command configures the URL for a Portal server.
Format
url url-string
undo url
Parameters
Parameter Description Value
url-string Specifies the URL of It is a string of 1 to 200 case-sensitive
a portal server. characters that do not contain spaces and
question marks (?). When double quotation
marks are used around the string, spaces are
allowed in the string.
Views
Portal server profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the Portal server IP address is configured using the 13.4.181 server-ip
(Portal server profile view) command, the Portal server URL is generated by
default on the device. If the existing Portal server URL is inconsistent with the
default one or the domain name needs to be used, you need to run the url
command to specify the Portal server URL.
Precautions
A Portal server only has one URL.
Example
# Set the URL of a Portal server to http://www.***.com in the Portal server profile
huawei.
<HUAWEI> system-view
[HUAWEI] web-auth-server huawei
[HUAWEI-web-auth-server-huawei] url http://www.***.com
Related Topics
13.4.89 display web-auth-server configuration
Format
url-parameter mac-address format delimiter delimiter { normal | compact }
undo url-parameter mac-address format
Parameters
Parameter Description Value
Views
URL template view
Default Level
2: Configuration level
Usage Guidelines
Portal servers or websites may require different MAC address formats. You can run
the url-parameter mac-address format command to set MAC address formats in
URL to meet the requirements of Portal servers or website.
Example
# Set the delimiter to - and format to XXXX-XXXX-XXXX.
<HUAWEI> system-view
[HUAWEI] url-template name huawei
[HUAWEI-url-template-huawei] url-parameter mac-address format delimiter - compact
13.4.199 url-parameter
Function
The url-parameter command sets parameters in a URL.
Format
url-parameter { ac-ip ac-ip-value | ac-mac ac-mac-value | ap-ip ap-ip-value | ap-
mac ap-mac-value | ssid ssid-value | login-url url-key url | redirect-url redirect-
url-value | sysname sysname-value | user-ipaddress user-ipaddress-value | user-
mac user-mac-value } *
undo url-parameter
NOTE
The ac-ip ac-ip-value, ac-mac ac-mac-value, ap-ip ap-ip-value, ap-mac ap-mac-value, and
ssid ssid-value parameters are only supported by the S5720HI.
Parameters
Parameter Description Value
ac-ip ac-ip- Specifies the IP address of the AC carried The value is a string
value in the URL and sets the parameter name of 1 to 16 case-
displayed in the URL. sensitive characters
This parameter applies only to wireless without spaces. If
users. By default, the value of device-ip the string is
carried in the URL is the CAPWAP enclosed in double
gateway address. quotation marks ("
"), the string can
contain spaces.
ac-mac ac- Specifies the MAC address of the AC The value is a string
mac-value carried in the URL and sets the of 1 to 16 case-
parameter name displayed in the URL. sensitive characters
without spaces. If
the string is
enclosed in double
quotation marks ("
"), the string can
contain spaces.
ap-ip ap-ip- Specifies the AP IP address carried in the The value is a string
value URL and sets the parameter name. of 1 to 16 case-
This parameter is only valid for wireless sensitive characters
access users. without spaces. If
the string is
enclosed in double
quotation marks ("
"), the string can
contain spaces.
ap-mac ap- Specifies the AP MAC address carried in The value is a string
mac-value the URL and sets the parameter name. of 1 to 16 case-
This parameter is only valid for wireless sensitive characters
access users. without spaces. If
the string is
enclosed in double
quotation marks ("
"), the string can
contain spaces.
ssid ssid- Specifies the SSID associated that users The value is a string
value associate with carried in the URL and of 1 to 16 case-
sets the parameter name. sensitive characters
This parameter is only valid for wireless without spaces. If
access users. the string is
enclosed in double
quotation marks ("
"), the string can
contain spaces.
login-url url- Specifies the login URL of the access ● url-key: The
key url device. value is a string
● url-key: specifies the identification of 1 to 16 case-
keyword for the login URL sent to the sensitive
Portal server during redirection. characters
without spaces,
● url: is a specified URL on the access question marks
device. (?), ampersands
(&), and equal
signs (=).
● url: The value is a
string of 1 to 200
case-sensitive
characters
without spaces.
redirect-url Specifies the original URL that a user The value is a string
redirect-url- accesses carried in the URL and sets the of 1 to 16 case-
value parameter name. sensitive characters
without spaces. If
the string is
enclosed in double
quotation marks ("
"), the string can
contain spaces.
sysname Specifies the device system name carried The value is a string
sysname- in the URL and sets the parameter name. of 1 to 16 case-
value sensitive characters
without spaces. If
the string is
enclosed in double
quotation marks ("
"), the string can
contain spaces.
user-mac Specifies the user MAC address carried in The value is a string
user-mac- the URL and sets the parameter name. of 1 to 16 case-
value sensitive characters
without spaces. If
the string is
enclosed in double
quotation marks ("
"), the string can
contain spaces.
Views
URL template view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a URL template is created using the 13.4.200 url-template name command
and URL is configured using the 13.4.196 url (URL template view) command,
you can use the url-parameter command to set the parameters in the URL. When
a user accesses the Portal server according to the URL, the Portal server obtains
user terminal information through the parameters in the URL. The Portal server
then provides the corresponding web authentication page for the user according
to user terminal information.
In addition, when users are pushed to a website rather than the Portal server
according to the URL, the website provides the different web pages for the users
according to user terminal information carried in the URL.
Precautions
URL parameter names configured on the device must be the same as those
supported by the server. In this example, the device is connected to the Agile
Controller-Campus.
URL Parameter URL Parameter Name Supported by
the Agile Controller-Campus
ac-ip ac-ip
ap-mac apmac
ssid ssid
redirect-url url
user-ipaddress userip
user-mac usermac
Example
# Set the user MAC address and access device system name in the URL.
<HUAWEI> system-view
[HUAWEI] url-template name huawei
[HUAWEI-url-template-huawei] url-parameter user-mac usermac sysname huawei
Function
The url-template name command creates a URL template or displays an existing
URL template view.
Format
url-template name template-name
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After a Portal authentication server template is created using the 13.4.211 web-
auth-server (system view) command, you can bind a URL template to the Portal
authentication server template. The URL template contains the redirection URL
and redirection URL parameters.
Example
# Create a URL template named huawei and enter the template view.
<HUAWEI> system-view
[HUAWEI] url-template name huawei
Function
The url-template command binds a URL template to a Portal server profile.
The undo url-template command unbinds a URL template from a Portal server
profile.
Format
url-template url-template [ ciphered-parameter-name ciphered-parameter-
name iv-parameter-name iv-parameter-name key cipher key-string ]
undo url-template
Parameters
Parameter Description Value
key cipher Specifies the shared key for The value is a string of 1 to
key-string encrypting the URL template 16 plain-text characters or
parameter. 48 cipher-text characters.
Views
Portal server profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the parameters of a URL template are configured, the URL template must be
bound to a Portal authentication server template so that users can be
authenticated on the Portal authentication server corresponding to the redirection
URL.
To ensure security, you can encrypt the parameter information in the URL
template bound to the Portal server profile.
Prerequisites
A URL template has been created using the 13.4.200 url-template name
command.
Precautions
If a URL template is bound to the Portal authentication server template and the
13.4.197 url (Portal server profile view) command is executed to configure the
redirection URL corresponding to the Portal authentication server, only the
parameters in the URL template take effect.
The URL configured using the 13.4.196 url (URL template view) command in the
URL template view cannot be a pushed URL; otherwise, the command does not
take effect.
The device support encryption of parameter information in the URL template only
when it connects to the Huawei Agile Controller-Campus.
Example
# Bind the URL template abc to the Portal authentication server template.
<HUAWEI> system-view
[HUAWEI] url-template name abc
[HUAWEI-url-template-abc] quit
[HUAWEI] web-auth-server huawei
[HUAWEI-web-auth-server-huawei] url-template abc
13.4.202 user-sync
Function
The user-sync command enables Portal authentication user information
synchronization.
The undo user-sync command disables Portal authentication user information
synchronization.
By default, Portal authentication user information synchronization is disabled.
Format
user-sync [ interval interval-period | max-times times ] *
undo user-sync
Parameters
Parameter Description Value
interval interval- The value is an integer that
Specifies the user
period ranges from 30 to 65535, in
information synchronization
seconds. The default value is
interval.
300.
max-times times Specifies the maximum The value is an integer that
number of user information ranges from 2 to 255. The
synchronization failures. default value is 3.
Views
Portal server profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If communication is interrupted because the network between the device and
Portal server is disconnected or the Portal server is faulty, online Portal
authentication users cannot go offline. Therefore, user information on the device
and on the Portal server may be inconsistent and accounting may be inaccurate.
The user-sync command enables user information synchronization so that user
information on the device and Portal server is synchronized at intervals to ensure
user information consistency.
During information synchronization, the device does not disconnect the user
immediately after detecting that the device has certain user information while the
server does not have such information. Instead, the device disconnects the user
when the maximum number of user information synchronization failures is
reached.
Precautions
If users go online during the keepalive interval of the Portal server, the Portal
server does not have their entries. After the Portal server goes Up and starts
synchronizing user information, the device does not disconnect these users even if
synchronization fails. The device retails these users until next time these users go
online and performs Portal authentication, ensuring good user experience.
When you run the user-sync command, make sure that the Portal server supports
this function. Otherwise, the users will go offline.
Example
# Enable user information synchronization in the Portal server profile abc, set the
interval for user information synchronization to 100s, and set the maximum
number of synchronization failures to 5.
<HUAWEI> system-view
[HUAWEI] web-auth-server abc
[HUAWEI-web-auth-server-abc] user-sync interval 100 max-times 5
Function
The vm-authen password command configures a password for virtual users
during RADIUS authentication.
The undo vm-authen password command restores the default password for
virtual users during RADIUS authentication.
The default username and password are available in S Series Switches Default
Usernames and Passwords (Enterprise Network or Carrier). If you have not
obtained the access permission of the document, see Help on the website to find
out how to obtain it.
NOTE
Format
vm-authen password cipher password
Parameters
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run the vm-authen password command to configure a password for
virtual users during RADIUS authentication.
Precautions
Example
# Set the password huawei for virtual users during RADIUS authentication.
<HUAWEI> system-view
[HUAWEI] vm-authen password cipher huawei
Function
The vm-user association-type command configures the association type of a
virtual user.
NOTE
Format
vm-user association-type { online | pre-online | offline } mac-address mac-
address interface interface-type interface-number vlan vlan-id [ ip-address ip-
address | profile profile-name | vsi vsi-name ] *
Parameters
Parameter Description Value
online Indicates that the association -
type of the virtual user is online.
profile profile- Specifies the profile to which the The value is a string of 1
name virtual user belongs. to 64 case-sensitive
characters without spaces.
vsi vsi-name Specifies the name of the virtual The value is a string of 1
site interface. to 64 case-sensitive
characters without spaces.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In virtual network management, you must configure the function specified by the
vm-user association-type command on the network management system (NMS)
so that virtual users can access the network. The NMS then delivers the function
configuration to the device. After receiving the related function configuration, the
device automatically runs the vm-user association-type command to configure
the association type of the virtual user.
Precautions
This command should be configured by the network administrator on the NMS
and delivered to the device. You are not advised to directly run this command on
the device.
Example
# Set the association type of the virtual user with the MAC address 1-1-1 in VLAN
10 on GE0/0/1 to pre-online.
<HUAWEI> system-view
[HUAWEI] vm-user association-type pre-online mac-address 1-1-1 interface gigabitethernet 0/0/1 vlan
10
Format
user-vlan vlan-id
undo user-vlan
Parameters
Parameter Description Value
Views
Service scheme view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
After creating a service scheme using the 13.1.82 service-scheme (AAA view)
command, you can run the vlan command to configure a user VLAN in the service
scheme. The user assigned with the service scheme will be added to the user
VLAN and obtain network resources in the VLAN.
Precautions
An authorized VLAN cannot be delivered to online Portal users.
If the user access mode is not multi-share, you must configure the link type of
the interface connected to users to hybrid and configure user packets to pass
through the interface in untagged mode. After the configuration, this command
can take effect.
Example
# Configure user VLAN 100 in the service scheme huawei.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] service-scheme huawei
[HUAWEI-aaa-service-huawei] user-vlan 100
Related Topics
13.1.82 service-scheme (AAA view)
Format
voice-vlan
undo voice-vlan
Parameters
None
Views
Service scheme view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
After creating a service scheme using the 13.1.82 service-scheme (AAA view)
command, you can run the voice-vlan command to enable the voice VLAN in the
service scheme. The voice user assigned with the service scheme will be added to
the voice VLAN and obtain network resources in the VLAN.
Precautions
Example
# Enable the voice VLAN in the service scheme huawei.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] service-scheme huawei
[HUAWEI-aaa-service-huawei] voice-vlan
Related Topics
13.1.82 service-scheme (AAA view)
NOTE
Format
vpn-instance vpn-instance-name
undo vpn-instance
Parameters
Parameter Description Value
Views
Portal server template view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A VPN implements interconnection within the same department and between
different departments in an enterprise. To enable the Portal authentication service
in the VPN, run the vpn-instance command to bind a Portal server template to a
VPN instance.
Prerequisites
A VPN instance has been created using the ip vpn-instance command.
Precautions
The VPN instance bound to the Portal server template must be the same as that
bound to the Portal server.
The users in VPN instances bound to different Portal server templates cannot use
the same IP addresses because users with the same IP addresses cannot go online
or offline.
Example
# Bind the Portal server template abc to the VPN instance vpn1.
<HUAWEI> system-view
[HUAWEI] ip vpn-instance vpn1
[HUAWEI-vpn-instance-vpn1] ipv4-family
[HUAWEI-vpn-instance-vpn1-af-ipv4] quit
[HUAWEI-vpn-instance-vpn1] quit
[HUAWEI] web-auth-server abc
[HUAWEI-web-auth-server-abc] vpn-instance vpn1
Function
The web-auth-server listening-port command sets the number of the port
through which a device listens on Portal protocol packets.
By default, the device uses port 2000 to listen on Portal protocol packets.
Format
web-auth-server listening-port port-number
Parameters
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When the device exchanges user authentication information with the Portal server
using the Portal protocol, you must configure the listening port on the device to
receive Portal packets.
You can run the web-auth-server listening-port command to set the number of
the port through which the device listens on Portal packets. The port number must
be the same as the destination port number in Portal packets sent by the Portal
server and must be unique.
NOTE
If a specified port is occupied by another service or is a reserved port, the configuration fails.
Ensure that the specified port is available when running this command.
Example
# Set the number of the port through which a device listens on Portal protocol
packets to 3000.
<HUAWEI> system-view
[HUAWEI] web-auth-server listening-port 3000
Related Topics
13.4.89 display web-auth-server configuration
Function
The web-auth-server command configures the Portal server profile used by a
Portal access profile.
By default, a Portal access profile does not use any Portal server profile.
Format
web-auth-server server-name [ bak-server-name ] { direct | layer3 }
undo web-auth-server
Parameters
Views
Portal access profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a Portal server profile is configured on the device, this profile must be bound
to a Portal access profile. When users who use the Portal access profile attempt to
access charged network resources, the HTTP requests are forcibly redirected to the
authentication page of the Portal server to implement Portal authentication.
To improve Portal authentication reliability, the backup Portal server profile can
also be bound to the Portal access profile. When the primary Portal server is
disconnected, the users are redirected to the backup Portal server for
authentication. This function can take effect only when the Portal server detection
function is enabled using the 13.4.180 server-detect command and heartbeat
detection is enabled on the Portal server.
The following Portal authentication modes are available:
● direct: When there is no Layer 3 forwarding device between the device and a
user, the device can learn the user's MAC address. You can configure the Layer
2 authentication mode so that the device can identify the user using the IP
address and MAC address.
● layer3: When there is a Layer 3 forwarding device between the device and a
user, the device cannot learn the user's MAC address and can only identify the
user using the IP address. You need to configure the Layer 3 authentication
mode.
Prerequisites
A Portal server profile has been created using 13.4.211 web-auth-server (system
view) and the IP address of the Portal server has been configured using 13.4.181
server-ip (Portal server profile view).
Precautions
Example
# Bind the Portal access profile p1 to the Portal server profiles server1 and
server2 (backup Portal server profile), and configure the Layer 2 authentication
mode.
<HUAWEI> system-view
[HUAWEI] web-auth-server server1
[HUAWEI-web-auth-server-server1] server-ip 10.10.1.1
[HUAWEI-web-auth-server-server1] quit
[HUAWEI] web-auth-server server2
[HUAWEI-web-auth-server-server2] server-ip 10.10.2.1
[HUAWEI-web-auth-server-server2] quit
[HUAWEI] portal-access-profile name p1
[HUAWEI-portal-acces-profile-p1] web-auth-server server1 server2 direct
Related Topics
13.4.211 web-auth-server (system view)
13.4.181 server-ip (Portal server profile view)
13.4.89 display web-auth-server configuration
13.4.61 display authentication-profile configuration
Function
The web-auth-server reply-message command enables the device to
transparently transmit users' authentication responses sent by the authentication
server to the Portal server.
Format
web-auth-server reply-message
undo web-auth-server reply-message
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The AAA server requires that the authentication messages sent to the Portal server
contain the authentication reply; therefore, the web-auth-server reply-message
command is required. In certain situations, the authentication messages are not
required to carry the reply. In this case, run the undo web-auth-server reply-
message command.
By default, the device directly forwards the authentication result message from the
RADIUS server to the Portal server without processing. This is called transparent
transmission.
Example
# Disable the device from transparently transmitting users' authentication
responses to the Portal server.
<HUAWEI> system-view
[HUAWEI] undo web-auth-server reply-message
Related Topics
13.4.89 display web-auth-server configuration
Format
web-auth-server server-name
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When an unauthenticated portal user goes online, the device forces the user to
log in to a specified website (also called the portal website). The user can access
resources in the portal website for free. When the user attempts to access charged
network resources, the user must pass authentication on the portal website. The
specific process is as follows:
1. The unauthorized user opens Internet Explorer and enters a URL in the
address box. When receiving the HTTP request sent by the user, the device
redirects it to the portal authentication page of the portal server.
2. The user enters user information on the authentication page or in the
authentication dialog box, and the portal server forwards the user information
to the device.
3. After receiving the user information from the portal server, the device sends
the information to the authentication server for authentication and
accounting.
4. After the user is authenticated, the device allows the user to access the
Internet if no security policy is enforced.
After a portal server profile is created on the device by using the web-auth-server
command, run other commands to create a route from the device to the portal
server.
Follow-up Procedure
Run the following commands to configure related attributes of the portal server
profile:
● Run the 13.4.181 server-ip (Portal server profile view) command to
configure an IP address for the portal server.
● Run the 13.4.197 url (Portal server profile view) command to configure a
URL of the portal server.
● Run the 13.4.138 port (Portal server profile view) command to set the port
number that a portal server uses to receive notification packets from the
device.
● Run the 13.4.182 shared-key (Portal server profile view) command
configures the shared key that the device uses to exchange information with
the portal server.
Precautions
You are advised to back up the portal server data to prevent authentication failure
caused by the portal server fault.
Example
# Create portal server profile named huawei.
<HUAWEI> system-view
[HUAWEI] web-auth-server huawei
Related Topics
13.4.89 display web-auth-server configuration
13.4.197 url (Portal server profile view)
13.4.181 server-ip (Portal server profile view)
13.4.138 port (Portal server profile view)
13.4.182 shared-key (Portal server profile view)
Format
web-auth-server version v2 [ v1 ]
Parameters
Parameter Description Value
v2 Indicates that the device supports the Portal protocol version -
V2.0. The major version currently used is V2.0.
v1 Indicates that the device supports the Portal protocol version -
V1.0.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Currently, the Portal protocol has two versions: V1.0 and V2.0. The device and
Portal server must use the Portal protocol of the same version to ensure normal
communication. You can run the web-auth-server version command to set the
Portal protocol version supported by the device.
NOTE
Example
# Configure the device to use only the Portal protocol V2.0.
<HUAWEI> system-view
[HUAWEI] web-auth-server version v2
Related Topics
13.4.89 display web-auth-server configuration
Function
The web-redirection disable command disables the Portal authentication
redirection function.
Format
web-redirection disable
undo web-redirection disable
Parameters
None
Views
Portal server profile view
Default Level
2: Configuration level
Usage Guidelines
The device redirects all unauthenticated users to the Portal authentication page
when the users send access requests to external networks. For example, when the
user needs to enter the URL of the authentication page manually, the web-
redirection disable command can be executed so that unauthorized users are not
forcibly redirected to the Portal authentication page.
Example
# Disable the Portal authentication redirection function.
<HUAWEI> system-view
[HUAWEI] web-auth-server nac
[HUAWEI-web-auth-server-nac] web-redirection disable
Related Topics
13.4.89 display web-auth-server configuration
Function
The access-user arp-detect command sets the source IP address and source MAC
address of offline detection packets in a VLAN.
The undo access-user arp-detect command deletes the source IP address and
source MAC address of offline detection packets in a VLAN.
By default, the source IP address and source MAC address are not specified for
offline detection packets in a VLAN.
Format
access-user arp-detect vlan vlan-id ip-address ip-address mac-address mac-
address
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The device sends an ARP probe packet to check the user online status. If the user
does not respond within a detection period, the device considers that the user is
offline.
If the VLAN to which the user belongs does not have a VLANIF interface or the
VLANIF interface does not have an IP address, the device sends an offline
detection packet using 0.0.0.0 as the source IP address. If a user cannot respond to
an ARP probe packet with the source IP address 0.0.0.0, you can specify a source IP
address for the offline detection packet.
In addition, a Windows client sends an ARP probe packet with the source IP
address 0.0.0.0 after obtaining an IP address. In this case, if the device also sends
an ARP probe packet with the source IP address 0.0.0.0, an IP address conflict
occurs. In this case, you can specify an IP address as the source IP address of ARP
probe packets sent by the device.
You are advised to specify the user gateway IP address and its corresponding MAC
address as the source IP address and source MAC address of ARP probe packets
sent by the device. If the gateway device changes, update the source MAC address
of the ARP probe packets sent by the device in a timely manner. Otherwise, the
gateway ARP entry on terminals may be incorrect, causing network disconnection.
Precautions
This function does not take effect for users who use Layer 3 Portal authentication.
If a user on a physical interface is online, this command takes effect only after the
user goes online again or the device re-authenticates the user.
If a user on a Eth-trunk interface is online, this command takes immediately.
Example
# Set the source IP address and MAC address of offline detection packets for users
in VLAN 10 to 192.168.1.1 and 2222-1111-1234 respectively.
<HUAWEI> system-view
[HUAWEI] access-user arp-detect vlan 10 ip-address 192.168.1.1 mac-address 2222-1111-1234
Related Topics
13.5.99 mac-authen timer
Format
access-user arp-detect default ip-address ip-address
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The device sends an ARP probe packet to check the user online status. If the user
does not respond within a detection period, the device considers that the user is
offline.
Precautions
This function does not take effect for users who use Layer 3 Portal authentication.
Example
# Set the default source IP address of offline detection packets to 0.0.0.0.
<HUAWEI> system-view
[HUAWEI] access-user arp-detect default ip-address 0.0.0.0
Format
access-user syslog-restrain enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When a user fails in authentication or goes offline, the device records a system
log. The system log contains the MAC addresses of access device and access user
and the authentication time.
If a user repeatedly attempts to go online after authentication failures or
frequently goes online and offline in a short period, a lot of system logs are
generated, which waste system resources and degrade system performance.
System log suppression can address this problem. After the device generates a
system log, it will not generate the same log within the suppression period (set by
13.5.5 access-user syslog-restrain period).
NOTE
The same system logs refer to the system logs containing the same MAC addresses. For
example, after the device generates a system log for a user failing in authentication, the
device will not generate new system log for this user in the suppression period if the user
fails in authentication again. The system logs for users logging offline are generated in the
same way.
Example
# Enable system log suppression.
<HUAWEI> system-view
[HUAWEI] access-user syslog-restrain enable
Related Topics
13.5.5 access-user syslog-restrain period
Format
access-user syslog-restrain period period
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After the system log suppression function is enabled using the 13.5.4 access-user
syslog-restrain enable command, use this command to set the system log
suppression period. After generating a system log, the device will not generate the
same log within the suppression period.
Example
# Set the period for system log suppression to 600s.
<HUAWEI> system-view
[HUAWEI] access-user syslog-restrain period 600
Related Topics
13.5.4 access-user syslog-restrain enable
Function
The acl-id command binds an ACL to a user group.
Format
acl-id acl-number
Parameters
Parameter Description Value
acl-number Specifies the number of an ACL bound to The value is an integer
a user group. that ranges from 3000 to
3999.
all Deletes all ACL rules bound to a user -
group.
Views
User group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a user group is created using the 13.5.156 user-group command, you can
run the acl-id acl-number command to bind an ACL to the user group, so that
users in the user group share an ACL.
NOTE
Before an ACL is bound to the user group, do not run the 13.5.157 user-group enable
command to enable the user group; otherwise, the ACL cannot be bound to the user group.
When the user group function is enabled on models except the S5720EI, S5720HI, S6720EI,
and S6720S-EI, ACL rules are delivered to each user and the user group function cannot be
used to save ACL resources.
Prerequisites
The ACL has been created using the 14.1.5 acl (system view) or 14.1.4 acl name
command and ACL rules have been configured using the rule command.
Precautions
● The ACL bound to a user group cannot be modified or deleted in the system
view.
● If no ACL rule is configured for a user group, the device does not restrict the
network access rights of users in the user group.
● When configuring ACL rules in a user group, create a rule that rejects all
network access requests and ensure that the rule can take effect.
● If all users in a group are required to have the same access rights, do not
specify the source IP address in the ACL bound to the user group. If an ACL
bound to a user group has defined the source IP address, only users with the
same IP address as the source IP address in the ACL can match the ACL in the
user group.
Example
# Bind ACL 3001 to the user group abc.
<HUAWEI> system-view
[HUAWEI] acl 3001
[HUAWEI-acl-adv-3001] rule 5 deny ip destination 192.168.5.0 0.0.0.255
[HUAWEI-acl-adv-3001] quit
[HUAWEI] user-group abc
[HUAWEI-user-group-abc] acl-id 3001
Related Topics
14.1.5 acl (system view)
13.5.156 user-group
13.5.157 user-group enable
13.5.55 display user-group
Function
The authentication critical eapol-success command configures the device to
send an Eapol-Success packet to a user after the user is added to the critical
VLAN.
By default, an Eapol-Fail packet is sent to a user after the user is added to the
critical VLAN.
Format
In the system view:
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, MultiGE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
After a user is added to the critical VLAN because the authentication server does
not respond, the device can be configured to send an Eapol-Success or Eapol-Fail
packet to the user to prevent the user from continuously sending access request
packets. After receiving the Eapol-Success packet or Eapol-Fail packet, the user
stops attempting to go online by sending the access request packet repeatedly,
which prevents the device performance from degrading.
The user receiving the Eapol-Success packet can still obtain the IP address through
a DHCP packet, while the user receiving the Eapol-Fail packet fails to do so. The
administrator can configure the device to send an Eapol-Success or Eapol-Fail
packet as required.
Example
# Configure the device to send an Eapol-Success packet to a user after the user is
added to the critical VLAN on GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] authentication critical eapol-success
Function
The authentication critical-vlan command configures a critical VLAN on an
interface.
Format
In the system view:
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, MultiGE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A critical VLAN is authorized for users when the authentication server does not
respond.
When the access device cannot communicate with the RADIUS server or the
RADIUS server fails, the authentication process on the network is interrupted and
users cannot pass the authentication. After the critical VLAN function of the device
is enabled, the device sets the state flag of the authentication server to Down and
adds the users to the critical VLAN. In this way, the users can access resources in
the critical VLAN without being authenticated.
Precautions
● This command is only valid for 802.1X authentication and MAC address
authentication.
● If the free-ip function is configured, the critical VLAN function becomes
invalid immediately.
● To make the VLAN authorization function take effect, the link type and access
control mode of the authentication interface must meet the following
requirements:
– When the link type is hybrid in untagged mode, the access control mode
can be based on the MAC address or interface.
– When the link type is access or trunk, the access control mode can only
be based on the interface.
Example
# In the system view, configure 802.1X authentication for the users using Port
address-based access method on GE0/0/1 and set the critical VLAN to VLAN 20.
<HUAWEI> system-view
[HUAWEI] vlan batch 20
[HUAWEI] dot1x enable
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-GigabitEthernet0/0/1] quit
[HUAWEI] dot1x enable interface gigabitethernet 0/0/1
[HUAWEI] dot1x port-method port interface gigabitethernet 0/0/1
[HUAWEI] authentication critical-vlan 20 interface gigabitethernet 0/0/1
# In the interface view, enable MAC address authentication on GE0/0/1 and set
the critical VLAN to VLAN 20.
<HUAWEI> system-view
[HUAWEI] vlan batch 20
[HUAWEI] mac-authen
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-GigabitEthernet0/0/1] mac-authen
[HUAWEI-GigabitEthernet0/0/1] authentication critical-vlan 20
Format
authentication device-type voice authorize [ user-group group-name ]
undo authentication device-type voice authorize [ user-group ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When both data terminals (such as PCs) and voice terminals (such as IP phones)
are connected to switches, NAC is configured on the switches to manage and
control the data terminals. The voice terminals, however, only need to connect to
the network without being managed and controlled. In this case, you can
configure the voice terminals to go online without authentication on the switches.
Then the voice terminals identified by the switches can go online without
authentication.
Precautions
To enable the switches to identify the voice terminals, enable LLDP or configure
OUI for the voice VLAN on the switches. For details, see "Configuring Basic LLDP
Functions" in "LLDP Configuration" in the S1720, S2700, S5700, and S6720
Voice terminals can obtain the corresponding network access rights after they pass
authentication and go online, when user-group group-name is not specified.
When user-group group-name is specified, voice terminals can obtain the network
access rights specified by the user group after they go online. To use a user group
to define network access rights for voice terminals, run the 13.5.156 user-group
group-name command to create a user group and configure network
authorization information for the users in the group. Note that the user group
takes effect only after it is enabled.
If you run this command repeatedly, the latest configuration overrides the
previous ones.
This function takes effect only for users who go online after this function is
successfully configured.
Example
# Enable voice terminals to go online without authentication.
<HUAWEI> system-view
[HUAWEI] authentication device-type voice authorize
The undo authentication event command cancels network access rights of users
in different authentication stages.
Format
● Command for 802.1X authentication:
System view, Ethernet interface view, GE interface view, MultiGE interface
view, XGE interface view, 40GE interface view, Eth-Trunk interface view:
authentication event { pre-authen | authen-fail | authen-server-down |
client-no-response } { vlan vlan-id | user-group group-name }
Parameters
Parameter Description Value
pre-authen Specifies the network access rights granted to users -
before authentication starts.
In an 802.1X authentication, when a device receives
an ARP or DHCP request packet sent from a user
terminal, but not an authentication request packet
from an 802.1X client, the device grants the pre-
authen right to the user. If only this parameter is
specified but the network access rights are not
configured for other events, the device grants the
pre-authen right to the users failing in
authentication.
In a MAC address or Portal authentication, if only
this parameter is specified but the network access
rights are not configured for other events, the
device grants the pre-authen right to the users
failing in authentication.
vlan vlan-id Specifies a VLAN ID. When this parameter is The value is
specified, the user can access only the resources in an integer
the VLAN. that ranges
from 1 to
4094.
Views
System view, VLANIF interface view, Ethernet interface view, GE interface view,
MultiGE interface view, XGE interface view, 40GE interface view, Eth-Trunk
interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To grant different network access rights to users in different stages, you can use
this command.
Prerequisites
Precautions
● If the command is executed in both the interface view and system view, the
configuration in interface view takes effect.
● This function takes effect only for users who go online after this function is
successfully configured.
● If the user-group parameter is specified in the command, only the network
access rights (that is, the ACL and VLAN bound to the user group) configured
for the user group take effect.
● If the network access rights specified in the authentication event command
were defined by a user group, the 13.5.64 dot1x free-ip command configured
in the system view cannot take effect and the 13.5.64 dot1x free-ip
command configured in the interface view does not take effect for the
interface.
● If the user-group parameter is specified in the command and the destination
network access rights in the authentication-free rule configured by 13.5.107
portal free-rule is the same as that defined for the user group, the
authentication-free rule does not take effect.
Example
# On GE0/0/1, allow users to access resources in VLAN 10 when authentication
fails.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] authentication event authen-fail vlan 10
Related Topics
13.5.63 dot1x enable
13.5.88 mac-authen
13.5.167 web-auth-server (system view)
13.5.156 user-group
Format
authentication event { authen-fail | authen-server-down } response-fail
undo authentication event { authen-fail | authen-server-down } response-fail
Parameters
Parameter Description Value
authen-fail Specifies that the device returns an authentication -
failure packet to the 802.1X client or portal server
when a user fails in authentication.
Views
System view, VLANIF interface view, Ethernet interface view, GE interface view,
MultiGE interface view, XGE interface view, 40GE interface view, Eth-Trunk
interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can use this command to configure the device to return an authentication
failure packet to the 802.1X client or portal server. In 802.1X authentication, the
802.1X client notifies the user of authentication failure. In portal authentication,
the portal server pushes an authentication failure message to the user. The user
then choose whether to perform reauthentication.
Precautions
● If the command is executed in both the interface view and system view, the
configuration in interface view takes effect.
● This function takes effect only for users who go online after this function is
successfully configured.
● This command is only applicable to the 802.1X authentication and Portal
authentication.
Example
# Configure GE0/0/1 to return an authentication failure packet to the 802.1X
client or portal server when a user fails in authentication.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] authentication event authen-fail response-fail
Related Topics
13.5.10 authentication event
Function
The authentication event session-timeout command sets the timeout period of
network access rights granted to users in different authentication stages.
Format
System view, Ethernet interface view, GE interface view, MultiGE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view
authentication event { pre-authen | authen-fail | authen-server-down | client-
no-response } session-timeout session-time
undo authentication event { pre-authen | authen-fail | authen-server-down |
client-no-response } session-timeout
VLANIF interface view
authentication event { pre-authen | authen-fail | authen-server-down }
session-timeout session-time
undo authentication event { pre-authen | authen-fail | authen-server-down }
session-timeout
Parameters
Parameter Description Value
pre-authen Specifies the timeout period of the network -
access rights granted to users before
authentication starts.
Views
System view, VLANIF interface view, Ethernet interface view, GE interface view,
MultiGE interface view, XGE interface view, 40GE interface view, Eth-Trunk
interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After you run the 13.5.10 authentication event command to grant the network
access rights to users in different authentication stages, you can run the
authentication event session-timeout command to specify the timeout period
for the network access rights. Users can access the authorized resources within the
timeout period, and will be forced to go offline after the timeout period expires.
If the aging time is set to 0, the network access rights granted to the user will not
expire. To disconnect the user from the network, run the cut access-user
command on the device or configure the authentication server to deliver an
offline message to the user.
Precautions
The timeout period set in the VLANIF interface view is not applicable to 802.1X
authentication.
If this command is only run in the system view, the configuration takes effect on
all interfaces. If this command is run in both the system view and interface view,
the configuration on interfaces takes precedence over the global configuration.
This function takes effect only for users who go online after this function is
successfully configured.
Example
# On interface GE0/0/1, set the timeout period of the network access rights
granted to users when authentication fails to 100 minutes.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] authentication event authen-fail session-timeout 100
Related Topics
13.5.10 authentication event
Function
The authentication guest-vlan command configures a guest VLAN on an
interface.
Format
In the system view:
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, MultiGE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Users in the guest VLAN can access resources in the guest VLAN without
authentication but must be authenticated when they access external resources.
NOTE
● The restrict VLAN is for the users who fail the authentication, while the guest VLAN is for the
users who are not authenticated.
● If only a guest VLAN is configured but no restrict VLAN is configured, the users who fail the
authentication are added to the guest VLAN.
Prerequisites
The VLAN to be configured as the guest VLAN must have been created.
802.1X authentication has been enabled globally and on the interface using the
dot1x enable command, or MAC address authentication has been enabled
globally and on the interface using the mac-authen command.
Precautions
● The guest VLAN function can take effect only in 802.1X and MAC address
authentication.
● A super VLAN cannot be configured as a guest VLAN.
● When free IP subnets are configured, the guest VLAN function becomes
invalid immediately.
● If the authentication function of the built-in Portal server is enabled, the
guest VLAN cannot be configured on interfaces.
● The guest VLAN function takes effect only when a user sends untagged
packets to the device.
● Different interfaces can be configured with different guest VLANs. After a
guest VLAN is configured on an interface, the guest VLAN cannot be deleted.
● To make the VLAN authorization function take effect, the link type and access
control mode of the authentication interface must meet the following
requirements:
– When the link type is hybrid in untagged mode, the access control mode
can be based on the MAC address or interface.
– When the link type is access or trunk, the access control mode can only
be based on the interface.
Example
# In the system view, configure 802.1X authentication for the users using Port-
based access method on GE0/0/1 and set the guest VLAN to VLAN 20.
<HUAWEI> system-view
[HUAWEI] vlan batch 20
[HUAWEI] dot1x enable
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-GigabitEthernet0/0/1] quit
[HUAWEI] dot1x enable interface gigabitethernet 0/0/1
[HUAWEI] dot1x port-method port interface gigabitethernet 0/0/1
[HUAWEI] authentication guest-vlan 20 interface gigabitethernet 0/0/1
# In the interface view, enable MAC address authentication on GE0/0/1 and set
the guest VLAN to VLAN 20.
<HUAWEI> system-view
[HUAWEI] vlan batch 20
[HUAWEI] mac-authen
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-GigabitEthernet0/0/1] mac-authen
[HUAWEI-GigabitEthernet0/0/1] authentication guest-vlan 20
Related Topics
13.5.63 dot1x enable
13.5.34 display dot1x
13.5.79 dot1x retry
13.5.88 mac-authen
13.5.38 display mac-authen
Format
authentication mac-move enable vlan { all | { vlan-id1 [ to vlan-id2 ] } & <1–
10> }
undo authentication mac-move enable vlan { all | { vlan-id1 [ to vlan-id2 ] } &
<1–10> }
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a user is authenticated and accesses the network from one interface of the
device, the network cable is pulled out from the interface and plugged in another
interface on the device. In this case, the user cannot immediately initiate
authentication and access the network. The user can initiate authentication on the
current interface only after the user offline detection interval expires or the
authentication interface is manually enabled and shut down to clear user online
entries. To improve user experience, MAC address migration is enabled so that the
user can immediately initiate authentication and access the network after be
switched to another access interface.
MAC address migration allows online NAC authentication users to immediately
initiate authentication and access the network after they are switched to other
access interfaces. If the user is authenticated successfully on the new interface, the
online user entry on the original interface is deleted immediately to ensure that
only one interface records the online user entry.
In addition, VLANs need to be specified for users in MAC address migration. The
VLANs before and after the migration can be specified for the users, and they can
be the same or different.
Precautions
● In normal case, enabling MAC address migration is not recommended. It
should be enabled only when users have migration requirements during
roaming. This prevents unauthorized users from forging MAC addresses of
online users and sending ARP, 802.1X, or DHCP packets on other
Example
# Enable MAC address migration in all VLANs.
<HUAWEI> system-view
[HUAWEI] authentication mac-move enable vlan all
By default, a device is disabled from detecting users' online status before user
MAC address migration.
Format
authentication mac-move detect enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
To prevent unauthorized users from spoofing online users to attack a device, run
the authentication mac-move detect enable command to enable the device to
detect users' online status before user MAC address migration. If no users are
online, the device permits MAC address migration and allows users to go online
from a new access interface. If a user is online, the device terminates MAC address
migration and does not allow the user to go online from a new access interface.
You can also run the 13.5.16 authentication mac-move detect retry-interval
retry-time command to set the detection interval and maximum number of
detections before user MAC address migration.
Example
# Enable a device to detect users' online status before user MAC address
migration.
<HUAWEI> system-view
[HUAWEI] authentication mac-move detect enable
Function
The authentication mac-move detect retry-interval retry-time command sets
the detection interval and maximum number of detections before user MAC
address migration.
By default, a device detects users' online status once. The detection interval is 3
seconds.
Format
authentication mac-move detect { retry-interval interval | retry-time times } *
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After a device is enabled to detect users' online status before user MAC address
migration, you can run the authentication mac-move detect { retry-interval
interval | retry-time times } * command to modify the default detection interval
and maximum number of detections.
Example
# Configure a device to detect users' online status twice at an interval of 5
seconds before user MAC address migration.
<HUAWEI> system-view
[HUAWEI] authentication mac-move detect retry-interval 5 retry-time 2
Function
The authentication mac-move quiet-log enable command enables the device to
record logs about MAC address migration quiet.
By default, the device is enabled to record logs about MAC address migration
quiet.
Format
authentication mac-move quiet-log enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The device can record logs when adding or deleting MAC address migration quiet
entries. This helps the administrator to find out the cause for MAC address
migration failure, and improves maintainability of the MAC address migration
quiet function.
Example
# Enable the device to record logs about MAC address migration quiet.
<HUAWEI> system-view
[HUAWEI] authentication mac-move quiet-log enable
Function
The authentication mac-move quiet-times quiet-period command configures
the quiet period and the maximum number of MAC address migration times
within 60 seconds before users enter the quiet state.
The default quiet period is 0 seconds and the maximum number of MAC address
migration times within 60 seconds before users enter the quiet state is 3.
Format
authentication mac-move { quiet-times times | quiet-period quiet-value } *
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When users frequently switch access interfaces (especially frequent switching due
to loops), the device needs to process a large number of authentication packets
and entries, which results in high CPU usage. To solve this problem, configure the
MAC address migration quiet function.
If the number of MAC address migration times for a user within 60 seconds
exceeds the value (times) after the MAC address migration quiet function is
enabled, the device quiets the user for a certain period (quiet-value). During the
quiet period, the device does not allow users to perform MAC address migration.
Example
# Configure the quiet period to 120 seconds and the maximum number of MAC
address migration times within 60 seconds before users enter the quiet state to 5.
<HUAWEI> system-view
[HUAWEI] authentication mac-move quiet-times 5 quiet-period 120
Format
authentication mac-move quiet-user-alarm enable
undo authentication mac-move quiet-user-alarm enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The device can send alarms about MAC address migration quiet to improve
maintainability of the MAC address migration quiet function. The device sends
alarms when the percentage of the actual user amount in the MAC address
migration quiet table against the maximum number of users exceeds the upper
alarm threshold configured. If the percentage decreases to be equal to or smaller
than the lower alarm threshold, the device sends a clear alarm. The upper and
lower alarm thresholds are configured using the 13.5.20 authentication mac-
move quiet-user-alarm percentage command.
Example
# Enable the device to send alarms about MAC address migration quiet.
<HUAWEI> system-view
[HUAWEI] authentication mac-move quiet-user-alarm enable
Format
authentication mac-move quiet-user-alarm percentage lower-threshold upper-
threshold
undo authentication mac-move quiet-user-alarm percentage
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The 13.5.19 authentication mac-move quiet-user-alarm enable command can
be run to enable the device to send alarms about MAC address migration quiet to
improve maintainability of the MAC address migration quiet function. The device
sends alarms when the percentage of the actual user amount in the MAC address
migration quiet table against the maximum number of users exceeds the upper
alarm threshold configured. If the percentage decreases to be equal to or smaller
than the lower alarm threshold, the device sends a clear alarm. The upper and
lower alarm thresholds are configured using the authentication mac-move
quiet-user-alarm percentage command.
Example
# Configure the upper alarm threshold to 80 and lower alarm threshold to 40.
<HUAWEI> system-view
[HUAWEI] authentication mac-move quiet-user-alarm percentage 40 80
Function
The authentication max-reauth-req command sets the maximum number of re-
authentication attempts for users in a critical VLAN.
Format
In the system view:
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, MultiGE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
When the authentication server maintained by the device turns to the Up state,
the device triggers re-authentication for users already added to the critical VLAN.
If the authentication is successful, the users exit the critical VLAN. However, if the
re-authentication fails due to reasons such as the fault of the access user's client,
the repeated re-authentication degrades the device performance. After the
maximum number of re-authentication attempts is set for users in the critical
VLAN, the device forces the user to exit the critical VLAN if the user fails the
authentication the specified number of times.
Example
# Set the maximum number of re-authentication attempts for users in the critical
VLAN to 5 on GE0/0/1.
<HUAWEI> system-view
[HUAWEI] authentication max-reauth-req 5 interface gigabitethernet 0/0/1
Format
In the system view:
authentication open interface { interface-type interface-number1 [ to interface-
number2 ] } &<1-10>
undo authentication open interface { interface-type interface-number1 [ to
interface-number2 ] } &<1-10>
In the interface view:
authentication open
undo authentication open
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, MultiGE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a new NAC network is set up, the network administrator should pay
attention to the number of potential access users and authentication method but
does not need to control user access, because the administrator needs to
configure user names, passwords, and authorization information on the
authentication server. After 802.1X or MAC address authentication is configured
on the access device, only authenticated users can access the network, so the
administrator cannot obtain information about the users who do not have user
names and passwords on the authentication server.
The NAC open function allows the users who failed in authentication to access the
network.
Precautions
● The NAC open function is only applied to 802.1X and MAC address
authentication.
● The NAC open function is only applied to RADIUS remote authentication.
● The NAC open function is valid only when the MAC address-based mode is
used as the access control mode of the interface. After this function is
enabled, users can be added to VLANs except a guest VLAN after they log in.
● After NAC open is enabled on an interface and fixed user names are used for
MAC address authentication, the users on the interface are allowed to access
the network even if they have used incorrect user names or passwords.
Example
# Enable the NAC open function on GE0/0/1.
<HUAWEI> system-view
[HUAWEI] authentication open interface gigabitethernet 0/0/1
Related Topics
13.5.63 dot1x enable
Format
In the system view:
authentication restrict-vlan vlan-id interface { interface-type interface-number1
[ to interface-number2 ] } &<1-10>
undo authentication restrict-vlan [ vlan-id ] interface { interface-type interface-
number1 [ to interface-number2 ] } &<1-10>
In the interface view:
authentication restrict-vlan vlan-id
undo authentication restrict-vlan [ vlan-id ]
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, MultiGE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can configure the restrict VLAN on the device interface, so that the users can
still access some network resources (for example, update the virus library) when
the users fail the authentication. The users who fail the authentication are added
to the restrict VLAN to access the resources in the restrict VLAN. Note that, the
user fails the authentication because the authentication server rejects the user for
some reasons, for example, the user enters an incorrect user password, not
because the authentication times out or the network is disconnected.
NOTE
● The restrict VLAN is for the users who fail the authentication, while the guest VLAN is for the
users who are not authenticated.
● If only a guest VLAN is configured but no restrict VLAN is configured, the users who fail the
authentication are added to the guest VLAN.
Prerequisites
The VLAN to be configured as the restrict VLAN must have been created.
Precautions
Example
# In the system view, configure 802.1X authentication for the users using Port-
based access method on GE0/0/1 and set the restrict VLAN to VLAN 20.
<HUAWEI> system-view
[HUAWEI] vlan batch 20
[HUAWEI] dot1x enable
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-GigabitEthernet0/0/1] quit
[HUAWEI] dot1x enable interface gigabitethernet 0/0/1
[HUAWEI] dot1x port-method port interface gigabitethernet 0/0/1
[HUAWEI] authentication restrict-vlan 20 interface gigabitethernet 0/0/1
Related Topics
13.5.63 dot1x enable
13.5.34 display dot1x
13.5.79 dot1x retry
Format
authentication speed-limit auto
undo authentication speed-limit auto
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When a lot of NAC users send authentication or log off requests to the device, the
CPU usage may be overloaded especially when the CPU or memory usage is
already high (for example, above 80%).
After this command is executed, the device limits the number of NAC packets
received per second if the CPU or memory usage is high. This function reduces
loads on the device CPU.
Example
# Enable the device to dynamically adjust the rate of packets from NAC users.
<HUAWEI> system-view
[HUAWEI] authentication speed-limit auto
Format
authentication timer re-authen { pre-authen re-authen-time | authen-fail re-
authen-time }
undo authentication timer re-authen { pre-authen | authen-fail }
Parameters
Parameter Description Value
pre-authen re- Specifies the interval for The value is an integer that ranges
authen-time re-authenticating pre- from 0 or 30 to 7200, in seconds.
connection users.
The value 0 indicates that the re-
authentication function is disabled
for pre-connection users.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The device creates the mapping user entries when network access policies are
assigned to users who are in the pre-connection phase or fail authentication. To
enable users to pass authentication in real time, the device periodically re-
authenticates the users who are in the pre-connection phase or fail authentication
according to the user entries. The administrator can adjust the re-authentication
interval based on the actual network requirements.
Precautions
This command only applies to 802.1X authentication and MAC address
authentication.
This function takes effect only for users who go online after this function is
successfully configured.
To reduce the impact on the device performance when many users exist, the user
re-authentication interval may be longer than the configured re-authentication
interval.
Example
# Configures the interval for re-authenticating users who fail to be authenticated
to 300 seconds.
<HUAWEI> system-view
[HUAWEI] authentication timer re-authen authen-fail 300
NOTE
Format
band-width share-mode
undo band-width share-mode
Parameters
None
Views
System view, AAA domain view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
On a home network, all family members go online using the same account. To
improve service experience of family members, you can enable the bandwidth
share mode so that all members can share the bandwidth.
Precautions
● This function does not apply to users who are connected through the inter-
card Eth-Trunk interface.
● If this command is run in the system view, it takes effect for all new online
users who connected to the device. If this command is run in the AAA domain
view, it takes effect only for new online users in the domain.
● If the local or remote RADIUS server does not assign CAR settings to the users
who will go online and the online users, the share mode is invalid to the
users.
● If the bandwidth share mode is enabled and different users use the same
account for authentication, the users going online with no CAR settings
assigned will not be affected when CAR settings are assigned to the users
who go online later.
Example
# Enable the bandwidth share mode in the system view.
<HUAWEI> system-view
[HUAWEI] band-width share-mode
NOTE
Only the S5720EI, S5720HI, S6720EI, and S6720S-EI support this command, and the user
group CAR can only be applied in the interface outbound direction (outbound) on the
S5720EI, S6720EI, and S6720S-EI.
Format
car { outbound | inbound } cir cir-value [ pir pir-value | cbs cbs-value | pbs pbs-
value ] *
undo car { outbound | inbound }
Parameters
Parameter Description Value
outbound Applies the user group CAR to -
the outgoing packets on an
interface to restrict the
outgoing packet rate.
pbs pbs-value Specifies the peak burst size The value is an integer that
(PBS), which is the maximum ranges from 10000 to
volume of burst traffic that 4294967295, in bytes.
can pass through an interface.
The value of pbs-value must be
larger than that of cbs-value and
is equal to 188 times of the
value of pir-value by default.
Views
User group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After user groups are created using the user-group command, you can run the car
outbound command to configure traffic control for users in a user group so that
users in different groups are allocated different bandwidths.
Precautions
● The car command takes effect on each user in a user group.
● This function takes effect only for users who go online after this function is
successfully configured.
Example
# Set the CIR to 10000 Kbit/s and the CBS to 50000 bytes for outgoing packets of
users in a user group.
<HUAWEI> system-view
[HUAWEI] user-group huawei
[HUAWEI-user-group-huawei] car outbound cir 10000 cbs 50000
Related Topics
13.5.137 reset access-user traffic-statistics
Format
cut access-user open
cut access-user user-group group-name
Parameters
Parameter Description Value
Views
AAA view
Default Level
3: Management level
Usage Guidelines
After a user goes online, if you want to modify the user's network access rights or
detect that the user is unauthorized, run this command to force the user offline.
Example
# Force open users offline.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] cut access-user open
Related Topics
13.5.31 display access-user
Function
The display aaa statistics access-type-authenreq command displays the number
of requests for MAC, Portal, or 802.1X authentication.
Format
display aaa statistics access-type-authenreq
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
When users send authentication requests, the device collects statistics on the
number of initiating MAC, Portal, or 802.1X authentications.
To view the number of requests for MAC, Portal, or 802.1X authentication, run the
display aaa statistics access-type-authenreq command.
Example
# Display the number of requests for MAC, Portal, or 802.1X authentication.
<HUAWEI> display aaa statistics access-type-authenreq
mac authentication request :2
portal authentication request :0
dot1x authentication request :0
Function
The display authentication mode command displays the current NAC
configuration mode and the mode after restart.
Format
display authentication mode
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display authentication mode command to view the current NAC
configuration mode.
Example
# Display the current NAC configuration mode and the mode after restart.
<HUAWEI> display authentication mode
Current authentication mode is unified-mode
Next authentication mode is unified-mode
Item Description
Format
display access-user open
NOTE
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to check information about online NAC users.
Example
# Display open user information.
<HUAWEI> display access-user open
-------------------------------------------------------------------------------
UserID Username IP address MAC Status
------------------------------------------------------------------------------
16016 1@radius 10.8.7.5 0011-0904-2f61 Success
------------------------------------------------------------------------------
Total: 1, printed: 1, Open: 1, printed: 1
NOTE
Only letters, digits, and special characters can be displayed for username.
When the value of username contains special characters or characters in other languages
except English, the device displays dots (.) for these characters. If there are more than three
such consecutive characters, three dots (.) are displayed. Here, the special characters are the
ASCII codes smaller than 32 (space) or larger than 126 (~).
When the value of username is longer than 20 characters, the device displays up to three dots
(.) for the characters following 19; that is, only 22 characters are displayed.
Item Description
Format
display authentication mac-move configuration
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display authentication mac-move configuration command to
view the MAC address migration configuration. The configuration includes the
number of times that MAC address migration users are allowed to migrate their
MAC addresses 60s before they enter the quiet state, the period that MAC address
migration users stay in the quiet state, the interval at which a device detects users'
online status before user MAC address migration, and the number of detections
before user MAC address migration.
Example
# Display the MAC address migration configuration.
<HUAWEI> display authentication mac-move configuration
Mac-move vlan config:all
Mac-move quiet times:1
Mac-move quiet period(s):120
Mac-move quiet log:ENABLE
Mac-move quiet user alarm:ENABLE
Mac-move quiet user alarm lower percentage(%):
50
Mac-move quiet user alarm upper percentage(%):100
Mac-move detect:DISABLE
Mac-move detect retry-interval(s):3
Mac-move detect retry-time:1
Item Description
Item Description
Mac-move quiet user alarm lower Lower alarm threshold for the
percentage(%) percentage of MAC address migration
users in quiet state.
For details, see the 13.5.20
authentication mac-move quiet-
user-alarm percentage command.
Mac-move quiet user alarm upper Upper alarm threshold for the
percentage(%) percentage of MAC address migration
users in quiet state.
For details, see the 13.5.20
authentication mac-move quiet-
user-alarm percentage command.
Function
The display authentication mac-move quiet-user command displays information
about MAC address migration users in quiet state.
Format
display authentication mac-move quiet-user { all | mac-address mac-address }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Run this command to view information about MAC address migration users in
quiet state.
Example
# Display information about all MAC address migration users in quiet state.
<HUAWEI> display authentication mac-move quiet-user all
Quiet MAC Information
-------------------------------------------------------------------------------
Quiet MAC Quiet Remain Time(Sec)
-------------------------------------------------------------------------------
0001-0002-0003 143
-------------------------------------------------------------------------------
1 quiet MAC found, 1 printed.
Format
display dot1x [ statistics ] [ interface { interface-type interface-number1 [ to
interface-number2 ] } &<1-10> ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run the display dot1x command to view configuration results of all
configuration commands in 802.1X authentication and statistics about 802.1X
packets.
The command output helps you to check whether the current 802.1X
authentication configuration is correct and isolate faults accordingly.
Follow-up Procedure
The display dot1x command displays the statistics on 802.1X packets. You can
locate the fault according to the packet statistics. When the fault is rectified, run
the reset dot1x statistics command to clear the packet statistics. After a period of
time, run the display dot1x command again to check the packet statistics. If no
error packet is found, the fault is rectified.
Example
# Display 802.1X authentication information.
<HUAWEI> display dot1x
Global 802.1x is Enabled
Authentication method is CHAP
Max users: 1024
Current users: 1
DHCP-trigger is Disabled
Handshake is Enabled
Quiet function is Enabled
Mc-trigger port-up-send is Disabled
Parameter set:Dot1x Handshake Period 16s Reauthen Period 60s
Arp Handshake Period 0s Client Timeout 10s
Quiet Period 600s Quiet-times 2
Eth-Trunk Handshake Period 120s Tx Period 30
Mac-By-Pass Delay 30s
dot1x URL: www.***.com.cn
Free-ip configuration(IP/mask):
192.168.1.0 /255.255.255.0
Item Description
Item Description
Mac-By-Pass Delay The value of the delay timer for MAC address bypass
authentication.
To set the timeout interval of a client, run the dot1x
timer command.
Port control type is The control mode on the interface is auto for 802.1X
Auto authentication user access. The access control modes
include auto, authorized-force, and unauthorized-
force.
To set the control mode, run the dot1x port-control
command.
Item Description
EAPOL Start Packets Number of globally received and sent EAPOL Start
packets.
Item Description
Format
display dot1x quiet-user { all | mac-address mac-address }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view information about 802.1X authentication users
who are quieted.
Example
# Display information about all 802.1X authentication users who are quieted.
<HUAWEI> display dot1x quiet-user all
-------------------------------------------------------------------------------
MacAddress Quiet Remain Time(Sec)
-------------------------------------------------------------------------------
0001-0002-0003 50
-------------------------------------------------------------------------------
1 silent mac address(es) found, 1 printed.
Table 13-83 Description of the display dot1x quiet-user all command output
Item Description
Function
The display mac-address authen command displays the current authen MAC
address entries in the system.
Format
display mac-address authen [ interface-type interface-number | vlan vlan-id ] *
[ verbose ]
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
The authen MAC address entries are generated for pre-connection users or after
users pass authentication. The administrator can run this command to check the
existing authen or guest MAC address entries on the device. The administrator can
check information about user access based on these MAC address entries to locate
user access faults.
Precautions
If there are a lot of authen MAC address entries, you can specify a VLAN or use a
pipe operator (|) to filter the output information. Otherwise, the following
problems may occur due to excessive output information:
● The displayed information is refreshed repeatedly on the terminal screen and
the administrator cannot obtain the required information.
● The device traverses and retrieves information for a long time, and does not
respond to any request.
Example
# Display all authen MAC address entries in the system.
<HUAWEI> display mac-address authen
-------------------------------------------------------------------------------
MAC Address VLAN/VSI/BD Learned-From Type
-------------------------------------------------------------------------------
0000-0000-0100 3000/-/- GE0/0/1 authen
0000-0000-0400 3000/-/- GE0/0/1 authen
0000-0000-0200 3000/-/- GE0/0/1 authen
-------------------------------------------------------------------------------
Total items displayed = 3
Item Description
Total items Total number of MAC address entries that match the filter
displayed condition.
Function
The display mac-address pre-authen command displays the current pre-authen
MAC address entries in the system.
Format
display mac-address pre-authen [ interface-type interface-number | vlan vlan-
id ] * [ verbose ]
Parameters
Parameter Description Value
vlan vlan-id Displays MAC address entries in a specified The value is an
VLAN. integer that
ranges from 1
If no VLAN is specified, MAC address entries to 4094.
in all VLANs of the device are displayed.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run this command to check the existing MAC address entries of the pre-
connection type to obtain access information about pre-connection users and
locate faults.
Precautions
If there are a lot of pre-authen MAC address entries, you can specify a VLAN or
use a pipe operator (|) to filter the output information. Otherwise, the following
problems may occur due to excessive output information:
● The displayed information is refreshed repeatedly on the terminal screen and
the administrator cannot obtain the required information.
● The device traverses and retrieves information for a long time, and does not
respond to any request.
Example
# Display all pre-authen MAC address entries in the system.
<HUAWEI> display mac-address pre-authen
-------------------------------------------------------------------------------
MAC Address VLAN/VSI/BD Learned-From Type
-------------------------------------------------------------------------------
0000-0000-0100 3000/-/- GE0/0/1 pre-authen
0000-0000-0400 3000/-/- GE0/0/1 pre-authen
0000-0000-0200 3000/-/- GE0/0/1 pre-authen
-------------------------------------------------------------------------------
Total items displayed = 3
Item Description
Total items Total number of MAC address entries that match the filter
displayed condition.
Format
display mac-authen [ interface { interface-type interface-number1 [ to interface-
number2 ] } &<1-10> | configuration ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run the display mac-authen command to view configuration results of all
configuration commands in MAC address authentication. The command output
Example
# View all information about MAC address authentication.
<HUAWEI> display mac-authen
MAC address authentication is Enabled.
Username format: use MAC address without-hyphen as username
Quiet period is 60s
Authentication fail times before quiet is 1
Offline detect period is 300s
Reauthenticate period is 1000s
Guest user reauthenticate period is 60s
Maximum users: 100
Current users: 1
Global domain is not configured
Trigger condition: dhcp arp dhcpv6 nd
Item Description
Item Description
Item Description
Item Description
Format
display mac-authen quiet-user { all | mac-address mac-address }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view information about MAC address authentication
users who are quieted.
Example
# Display information about all MAC address authentication users who are
quieted.
<HUAWEI> display mac-authen quiet-user all
-------------------------------------------------------------------------------
MacAddress Quiet Remain Time(Sec)
-------------------------------------------------------------------------------
0001-0002-0003 50
-------------------------------------------------------------------------------
1 silent mac address(es) found, 1 printed.
Item Description
Function
The display port connection-type access all command displays all current
downlink interfaces on the device.
Format
display port connection-type access all
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to check all current downlink interfaces on the device.
Example
# Display all current downlink interfaces on the device.
<HUAWEI> display port connection-type access all
Slot 0:
GigabitEthernet0/0/1 GigabitEthernet0/0/2 GigabitEthernet0/0/3
GigabitEthernet0/0/4 GigabitEthernet0/0/5 GigabitEthernet0/0/6
GigabitEthernet0/0/7 GigabitEthernet0/0/8 GigabitEthernet0/0/9
GigabitEthernet0/0/10 GigabitEthernet0/0/11 GigabitEthernet0/0/12
GigabitEthernet0/0/13 GigabitEthernet0/0/14 GigabitEthernet0/0/15
GigabitEthernet0/0/16 GigabitEthernet0/0/17 GigabitEthernet0/0/18
GigabitEthernet0/0/19 GigabitEthernet0/0/20 GigabitEthernet0/0/21
GigabitEthernet0/0/22 GigabitEthernet0/0/23 GigabitEthernet0/0/24
Table 13-88 Description of the display port connection-type access all command
output
Item Description
Function
The display portal command displays the Portal authentication configuration.
Format
display portal [ interface interface-type interface-number | configuration ]
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display portal command to view the Portal authentication
configuration and check whether the configuration is correct.
Example
# Display the Portal authentication configuration.
<HUAWEI> display portal
Portal timer offline-detect length:500
Portal max-user number:100
Quiet function is Disabled
Different-server is Disabled
Parameter set: Quiet Period 60s Quiet-times 3
Logout packets resend: Resend-times 3 Timeout 5s
Portal user(s) on slot 0:1
Item Description
Item Description
Function
The display portal free-rule command displays authentication-free rules for
Portal authentication users.
Format
display portal free-rule [ rule-id ]
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The display portal free-rule command shows the configuration of
authentication-free rules. You can locate faults according to the command output.
Example
# Display the configuration of authentication-free rules.
<HUAWEI> display portal free-rule
portal free-rule 0 destination ip 10.1.1.1 mask 255.255.255.255
portal free-rule 10 destination ip 10.1.1.2 mask 255.255.255.255
Total 2 free-rules
Related Topics
13.5.107 portal free-rule
Format
display portal local-server
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After configuring the built-in Portal authentication, run this command to view the
configurations of a built-in Portal server.
Example
# Display the configurations of a built-in Portal server.
<HUAWEI> display portal local-server
Portal local-server config:
server status : disable
Heartbeat-check status : disable
server ip :-
authentication method : chap
protocol :-
https ssl-policy :-
server port :0
session-timeout : 8(h)
syslog-limit : enable
syslog-limit period : 300(s)
server pagename :-
server page-text :-
server policy-text :-
server background-image : default-image0
server background-color : -
server logo :-
server ad-image :-
Item Description
Item Description
Format
display portal local-server connect [ user-ip ip-address ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display portal local-server connect command to check the
authentication mode and status of users to be authenticated on a built-in Portal
server.
Example
# Display the connection status of the user with the IP address 9.8.7.6 on a built-in
Portal server.
<HUAWEI> display portal local-server connect user-ip 10.1.1.10
-------------------------------------------------------------------------------
CID IP Address AuthMode State
1 10.1.1.10 CHAP ONLINE
--------------------------------------------------------------------------------
# Display the connection status of all users on the built-in Portal server.
<HUAWEI> display portal local-server connect
-------------------------------------------------------------------------------
CID IP Address AuthMode State
1 10.1.1.10 CHAP ONLINE
2 10.1.1.11 PAP ONLINE
--------------------------------------------------------------------------------
Related Topics
13.5.111 portal local-server authentication-method
13.5.108 portal local-server
13.5.114 portal local-server enable
Format
display portal local-server page-information
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display portal local-server page-information command to
check the page files loaded to the memory of a built-in Portal server.
Example
# Display the page files loaded to the memory of a built-in Portal server.
<HUAWEI> display portal local-server page-information
--------------------------------------------------------------------------------
Number of backup pages:35
Size of backup pages:94438 byte
--------------------------------------------------------------------------------
Name:/logout_success.html
Size:4042 byte
Last-Modified-Time:2011-12-16 20:24:46
--------------------------------------------------------------------------------
Item Description
Related Topics
13.5.117 portal local-server load
Function
The display portal quiet-user command displays information about Portal
authentication users in quiet state.
Format
display portal quiet-user { all | server-ip ip-address | user-ip ip-address }
Parameters
Parameter Description Value
all Displays information about all Portal -
authentication users in quiet state.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After the quiet timer is enabled, you can run the display portal quiet-user
command to view information about Portal authentication users in quiet state.
Example
# Display information about all Portal authentication users in quiet state.
<HUAWEI> display portal quiet-user all
Quiet IP information
-------------------------------------------------------------------------------------
Quiet ip Quiet Remain Time(Sec)
------------------------------------------------------------------------------------
192.168.1.1 10
192.168.1.2 20
------------------------------------------------------------------------------------
2 quiet IP found, 2 printed.
# Display information about all the users in quiet state authenticated by the
Portal authentication server with IP address 192.168.2.1.
<HUAWEI> display portal quiet-user server-ip 192.168.2.1
Quiet IP information
-------------------------------------------------------------------------------------
Quiet ip Quiet Remain Time(Sec)
------------------------------------------------------------------------------------
192.168.1.3 10
192.168.1.4 20
------------------------------------------------------------------------------------
2 quiet IP found, 2 printed.
Item Description
Related Topics
13.5.127 portal quiet-period
13.5.128 portal quiet-times
13.5.130 portal timer quiet-period
Function
The display portal user-logout command displays temporary logout entries of
Portal authentication users.
Format
display portal user-logout [ ip-address ip-address [ vpn-instance vpn-instance-
name ] ]
NOTE
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The device records temporary entries after Portal authentication users are
disconnected. The network administrator can run this command to check
temporary logout entries to locate faults.
If the parameter ip-address ip-address [ vpn-instance vpn-instance-name ] is not
specified, the temporary logout entries of all Portal authentication users are
displayed.
Example
# Display the temporary logout entries of all Portal authentication users.
<HUAWEI> display portal user-logout
--------------------------------------------------------------
UserIP Vrf Resend Times TableID
--------------------------------------------------------------
192.168.111.100 1 3 0
--------------------------------------------------------------
Total: 1, printed: 1
Item Description
Function
The display portal url-encode configuration command displays the
configuration of URL encoding and decoding.
Format
display portal url-encode configuration
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After configuring URL encoding and decoding, you can run the display portal url-
encode configuration command to check the configuration.
Example
# Display the configuration of URL encoding and decoding.
<HUAWEI> display portal url-encode configuration
Portal URL Encode : Disable
Related Topics
13.5.131 portal url-encode enable
Format
display server-detect state [ web-auth-server server-name ]
Parameters
Parameter Description Value
web-auth-server Displays information about the Portal The Portal server
server-name server status configured in the specified template name
Portal server template. must exist.
If this parameter is not specified, status
of all Portal servers is displayed.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
When an external Portal server is used for Portal authentication, you can run the
display server-detect state command to check information about the Portal
server status.
Example
# Display information about the Portal server status configured in the Portal
server template abc.
<HUAWEI> display server-detect state web-auth-server abc
Web-auth-server : abc
Total-servers : 4
Live-servers : 1
Critical-num : 0
Status : Normal
Ip-address Status
192.168.2.1 UP
192.168.2.2 DOWN
192.168.2.3 DOWN
192.168.2.4 DOWN
Related Topics
13.5.141 server-ip (Portal server template view)
13.5.140 server-detect
Function
The display snmp-agent trap feature-name mid_aaa all command displays the
status of all traps on the AAA module.
Format
display snmp-agent trap feature-name mid_aaa all
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After enabling the trap function for the AAA module, you can run this command
to check the status of all traps on the AAA module. To enable the trap function for
the AAA module, run the snmp-agent trap enable feature-name mid_aaa
command.
Prerequisites
The SNMP function has been enabled on the device. For details, see snmp-agent.
Example
# Display the status of all traps on the AAA module.
<HUAWEI> display snmp-agent trap feature-name mid_aaa all
------------------------------------------------------------------------------
Feature name: MID_AAA
Trap number : 2
------------------------------------------------------------------------------
Trap name Default switch status Current switch status
hwMacMovedQuietMaxUserAlarm on on
hwMacMovedQuietUserClearAlarm on on
Item Description
Item Description
Related Topics
13.5.143 snmp-agent trap enable feature-name mid_aaa
Format
display snmp-agent trap feature-name mid_eapol all
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After enabling the trap function for the DOT1X module, you can run this
command to check the status of all traps on the DOT1X module. To enable the
trap function for the DOT1X module, run the snmp-agent trap enable feature-
name mid_eapol command.
Prerequisites
The SNMP function has been enabled on the device. For details, see snmp-agent.
Example
# Display the status of all traps on the DOT1X module.
<HUAWEI> display snmp-agent trap feature-name mid_eapol all
------------------------------------------------------------------------------
Feature name: MID_EAPOL
Trap number : 2
------------------------------------------------------------------------------
Trap name Default switch status Current switch status
hwSrvcfgEapMaxUserAlarm on on
hwMacAuthenMaxUserAlarm on on
Item Description
Related Topics
13.5.144 snmp-agent trap enable feature-name mid_eapol
Function
The display snmp-agent trap feature-name mid_web all command displays the
status of all traps on the web authentication module.
Format
display snmp-agent trap feature-name mid_web all
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After enabling the trap function for the web authentication module, you can run
this command to check the status of all traps on the web authentication module.
To enable the trap function for the web authentication module, run the snmp-
agent trap enable feature-name mid_web command.
Prerequisites
The SNMP function has been enabled on the device. For details, see snmp-agent.
Example
# Display the status of all traps on the web authentication module.
<HUAWEI> display snmp-agent trap feature-name mid_web all
------------------------------------------------------------------------------
Feature name: MID_WEB
Trap number : 4
------------------------------------------------------------------------------
Trap name Default switch status Current switch status
hwPortalServerUp on on
hwPortalServerDown on on
hwPortalMaxUserAlarm on on
hwPortalUserClearAlarm on on
Item Description
Related Topics
13.5.145 snmp-agent trap enable feature-name mid_web
Function
The display static-user command displays static user information.
Format
display static-user [ domain-name domain-name | interface interface-type
interface-number | ip-address start-ip-address [ end-ip-address ] | vpn-instance
vpn-instance-name ] *
NOTE
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After a static user is configured, you can run the display static-user command to
view the static user information.
Example
# Display information about all static users configured.
<HUAWEI> display static-user
IP-address Interface MAC-address VPN
-------------------------------------------------------------------------------
10.1.1.1 GE0/0/3 - -
10.1.1.2 GE0/0/3 - -
10.1.1.3 GE0/0/3 - -
10.1.1.5 GE0/0/5 0001-0001-0001 -
10.1.1.6 GE0/0/5 0001-0001-0001 -
10.1.1.7 GE0/0/5 0001-0001-0001 -
10.1.1.8 GE0/0/5 0001-0001-0001 -
10.1.1.10 - 0002-0002-0002 -
10.1.1.11 - 0002-0002-0002 -
10.1.1.12 - 0002-0002-0002 -
-------------------------------------------------------------------------------
Total item(s) displayed = 10
Total item(s) number= m, displayed The total number of entries is m and the
number= n number of displayed entries is n.
Related Topics
13.5.147 static-user
13.5.149 static-user username format-include
13.5.148 static-user password
Format
display url-template { all | name template-name }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After a URL template is configured, run the display url-template command to
view information about the URL template.
Example
# Display information about all configured URL templates.
<HUAWEI> display url-template all
-------------------------------------------------------------------------------
Name URL Start Assignment Isolate
Number Mark Mark Mark
-------------------------------------------------------------------------------
huawei 0 ? = &
huawei2 0 ? = &
huawei3 0 ? = &
-------------------------------------------------------------------------------
Total 3
Delimiter :%
Format : normal
Login URL Key : logiurl
Login URL : http:\\huawei.com
Format
display user-group [ group-name ]
Parameters
Parameter Description Value
group-name Displays the configuration of a The value is a string of 1
specified user group. to 64 case-sensitive
characters without spaces.
The configurations of all user groups
are displayed if this parameter is not
specified.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display user-group command to obtain the user group
configuration and locate faults according to the command output.
Example
# Display the configuration of all user groups.
<HUAWEI> display user-group
-------------------------------------------------------------------------------
ID Group name Rule-num User-num Status
-------------------------------------------------------------------------------
0 abc 0 0 disabled
-------------------------------------------------------------------------------
Total 1
NOTE
When the length of Group name exceeds 14 characters, the name is displayed in abridged
mode.
Related Topics
13.5.6 acl-id (user group view)
13.5.156 user-group
13.5.157 user-group enable
Format
display web-auth-server configuration
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After the Portal server template is configured, the display web-auth-server
configuration displays the Portal server configuration.
Example
# Display the Portal server configuration.
<HUAWEI> display web-auth-server configuration
Listening port : 2000
Portal : version 1, version 2
Include reply message : enabled
-------------------------------------------------------------------------------
Enabled protocol : https
Listening port : 8443
SSL policy : default_policy
-------------------------------------------------------------------------------
Web-auth-server Name : huawei
IP-address :
Shared-key :
Source-IP :-
Port / PortFlag : 50100 / NO
URL : https://192.168.2.10:8443/webauth
URL Template :
URL Template ParaName:
URL Template IVName :
URL Template Key :
Redirection : Enable
Sync : Disable
Sync Seconds : 300
Sync Max-times :3
Detect : Disable
Detect Seconds : 60
Detect Max-times :3
Detect Critical-num : 0
Detect Action :
VPN Instance :
Bound Vlanif :
Bound Interface :
Protocol : http
Http Get-method : disable
Password Encrypt : none
-------------------------------------------------------------------------------
1 Web authentication server(s) in total
Item Description
Include reply message Whether the packets sent from the device
to the Portal server contain
authentication responses.
● enabled
● disabled
To enable the device to transparently
transmit authentication responses of
users sent by the authentication server to
the Portal server, run the 13.5.166 web-
auth-server reply-message command.
Item Description
Item Description
Item Description
Item Description
Item Description
Item Description
Format
device-sensor dhcp option option-code &<1-6>
undo device-sensor dhcp option option-code &<1-6>
Parameters
Parameter Description Value
option-code Specifies the DHCP option field that the The value is an
device needs to resolve. integer that ranges
from 1 to 254.
The option fields in a DHCP packet carry the
control information and parameters, for
example, terminal type.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A device usually connects to many types of terminals. You may need to assign
different network access rights or packet processing priorities to the terminals of
different types. For example, the voice devices, such as IP phones, should be
assigned a high packet processing priority because voice signals require low delay
and jitter.
After the DHCP-based terminal type awareness function is enabled, the device can
resolve the option fields that carry terminal type information in the received DHCP
Request packets. The device then sends the option information to the RADIUS
server through RADIUS accounting packets. Through the option information, the
RADIUS server knows the terminal types and controls the network access rights
and packet processing priorities of the terminals.
Precautions
● The command takes effect only when the authentication or accounting mode
in the AAA scheme is RADIUS.
● To make this command take effect, you must run the 14.8.20 dhcp snooping
enable command on the interfaces or in VLANs.
Example
# Set the option fields to be resolved by the device to option 60.
<HUAWEI> system-view
[HUAWEI] device-sensor dhcp option 60
Related Topics
14.8.20 dhcp snooping enable
Format
device-sensor lldp tlv tlv-type &<1-4>
undo device-sensor lldp tlv
Parameters
Parameter Description Value
tlv-type Specifies the The value is an integer that can be 1, 2, 5, 6, 7, 8,
LLDP TLV type as and 127. The values are as follows:
the terminal ● 1: Chassis ID TLV, indicating the bridge MAC
type to be aware address of the device
of the device.
● 2: Port ID TLV, indicating the port identifying
the LLD PDU sending end
● 5: System Name TLV, indicating the device
name
● 6: System Description TLV, indicating the
system description
● 7: System Capabilities TLV, indicating the
system capabilities
● 8: Management Address TLV, indicating the
management address
● 127: Organization Specific TLV, indicating the
user-defined organization information. You can
run the lldp tlv-enable med-tlv command on
the physical interface for user access to set this
parameter.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A device usually connects to many types of terminals. You may need to assign
different network access rights or packet processing priorities to the terminals of
different types. For example, the voice devices, such as IP phones, should be
assigned a high packet processing priority because voice signals require low delay
and jitter.
Using the LLDP-based terminal type awareness function, the device parses the
required TLV type containing terminal type information from the received LLDP
packets. The device then sends the TLV type information to the RADIUS server
through a RADIUS accounting packet. Through the TLV type information, the
RADIUS server knows the terminal types and controls the network access rights
and packet processing priorities of the terminals.
Precautions
● The command takes effect only when the authentication or accounting mode
in the AAA scheme is RADIUS.
● The command takes effect only when the LLDP function is enabled on the
device and the connected peer device.
Example
# Enable the terminal type awareness function based on LLDP TLV type 5.
<HUAWEI> system-view
[HUAWEI] device-sensor lldp tlv 5
Related Topics
13.5.57 device-sensor dhcp option
Function
The dot1x authentication-method command sets the authentication mode for
802.1X users.
Format
dot1x authentication-method { chap | pap | eap }
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, MultiGE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
During 802.1X authentication, users exchange authentication information with the
device using EAP packets. The device uses two modes to exchange authentication
information with the RADIUS server.
● EAP termination: The device directly parses EAP packets, encapsulates user
authentication information into a RADIUS packet, and sends the RADIUS
packet to the RADIUS server for authentication. In EAP termination
authentication mode, the device and RADIUS server exchange information
using PAP or CHAP.
– PAP: The device arranges the MAC address, shared key, and random value
in sequence, performs hash processing on them using the MD5 algorithm,
and encapsulates the hash result into the User-Password attribute.
– CHAP: The device arranges the CHAP ID, MAC address, and random value
in sequence, performs hash processing on them using the MD5 algorithm,
and encapsulates the hash result into the CHAP-Password and CHAP-
Challenge attributes.
After the device directly parses EAP packets, user information in the EAP
packets is authenticated by a local AAA module, or sent to the RADIUS or
HWTACACS server for authentication.
● EAP relay (specified by eap): The device encapsulates EAP packets into
RADIUS packets and sends the RADIUS packets to the RADIUS server, but
does not parse the received EAP packets that include user authentication
information. This mechanism is called EAP over Radius (EAPOR).
The EAP relay mechanism requires that the RADIUS server be capable of parsing a
lot of EAP packets and carrying out authentication; therefore, if the RADIUS server
has high processing capabilities, the EAP relay is used. If the RADIUS server is
incapable of parsing a lot of EAP packets and carrying out authentication, EAP
termination is recommended, and the device helps the RADIUS server to parse
EAP packets.
NOTE
● The authentication mode can be set to EAP relay for 802.1X authentication users only
when the RADIUS authentication is used.
● If the 802.1X client uses the MD5 encryption mode, the user authentication mode on
the device can be set to EAP or CHAP; if the 802.1X client uses the PEAP authentication
mode, the authentication mode on the device can be set to EAP.
Example
# Set the authentication mode to EAP for 802.1X users in the device in the system
view.
<HUAWEI> system-view
[HUAWEI] dot1x authentication-method eap
Related Topics
13.5.34 display dot1x
Function
The dot1x dhcp-trigger command enables DHCP-triggered 802.1X authentication.
Format
dot1x dhcp-trigger
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
NOTE
After receiving the request packet from an 802.1X user, the device starts authenticating the
user. If the user is authenticated, the device allocates an IP address to the user through a
DHCP server; if the user fails the authentication, the user cannot obtain a dynamic IP
address from the DHCP server.
Prerequisites
802.1X authentication has been enabled globally and on an interface using the
13.5.63 dot1x enable command.
Precautions
The dot1x dhcp-trigger command can be used only when the client supports
DHCP and 802.1X authentication.
Example
# Enable DHCP-triggered 802.1X authentication.
<HUAWEI> system-view
[HUAWEI] dot1x dhcp-trigger
Related Topics
13.5.63 dot1x enable
13.5.34 display dot1x
Function
The dot1x domain command configures a forcible domain for 802.1X
authentication users.
The undo dot1x domain command restores the default setting of a forcible
domain for 802.1X authentication users.
Format
dot1x domain domain-name
Parameters
Parameter Description Value
Views
Ethernet interface view, GE interface view, MultiGE interface view, XGE interface
view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
During authentication, if the user name entered by a user does not contain a
domain name, the user will be authenticated in the default domain; if the user
name contains a domain name, the user will be authenticated in the specified
domain.
If the user names entered by many users do not contain domain names, excess
users are authenticated in the default domain, making the authentication scheme
inflexible. If all users on an interface need to use the same AAA scheme when the
user names entered by some users contain domain name and those entered by
other users do not, the device also cannot meet such requirement. To address this
issue, you can configure a forcible domain. Then all users on the interface will be
authenticated in the forcible domain no matter whether the user names entered
by the users contain domain names.
Prerequisites
A domain has been created using the 13.1.47 domain (AAA view) command.
Example
# Configure the forcible domain huawei for 802.1X authentication users on the
interface GE0/0/1.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] domain huawei
[HUAWEI-aaa-domain-huawei] quit
[HUAWEI-aaa] quit
[HUAWEI] interface gigabitethernet0/0/1
[HUAWEI-GigabitEthernet0/0/1] dot1x domain huawei
Related Topics
13.1.47 domain (AAA view)
By default, the device is disabled from sending an EAP packet code number to
users.
Format
dot1x eap-notify-packet eap-code code-number data-type type-number
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a non-Huawei device used as the RADIUS server sends RADIUS packets with
attribute 61, EAP packet code number 0xa (hexadecimal notation, 10 in decimal
notation), and data type 0x19 (hexadecimal notation, 25 in decimal notation) to
the device, run the dot1x eap-notify-packet command on the device so that the
device can send EAP packets with code number 0xa and data type 0x19 to users. If
the dot1x eap-notify-packet command is not executed, the device does not
process EAP packets of this type and users are disconnected.
Precautions
The device can only process EAP packets with code number 10 and data type 25.
Example
# Allow the device to send EAP packets with code number 10 and data type 25 to
users.
<HUAWEI> system-view
[HUAWEI] dot1x eap-notify-packet eap-code 10 data-type 25
Related Topics
13.5.63 dot1x enable
Format
In the system view:
dot1x enable [ interface { interface-type interface-number1 [ to interface-
number2 ] } &<1-10> ]
undo dot1x enable [ interface { interface-type interface-number1 [ to interface-
number2 ] } &<1-10> ]
In the interface view:
dot1x enable
undo dot1x enable
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, MultiGE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The IEEE 802.1X standard (802.1X for short) is a port-based network access control
protocol. You can run the dot1x enable command to enable 802.1X
authentication globally and on an interface.
● All users have been disconnected before the undo operation is executed.
● After the static MAC address entry is configured using the mac-address static
mac-address interface-type interface-number vlan vlan-id command, the user
corresponding to the entry cannot pass 802.1X authentication.
● If 802.1X authentication is enabled on an interface, the following commands
cannot be used on the same interface.
Command Function
Example
# Enable 802.1X authentication on GE0/0/1 in the system view.
<HUAWEI> system-view
[HUAWEI] dot1x enable
[HUAWEI] dot1x enable interface gigabitethernet 0/0/1
Related Topics
13.5.34 display dot1x
The undo dot1x free-ip command deletes the configured free IP subnet.
Format
dot1x free-ip ip-address { mask-length | mask-address }
Parameters
Parameter Description Value
ip-address Specifies a free IP subnet. The value is in dotted decimal
notation.
mask-length Specifies the mask length of an The value is an integer that
IP address. ranges from 1 to 32.
mask-address Specifies the mask of the IP The value is in dotted decimal
address. notation.
all Deletes all free IP subnets. -
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
802.1X users can access networks only after being authenticated. You can
configure a free IP subnet, so that users can access network resources in the free
IP subnet before being authenticated.
Precautions
Example
# Configure 192.168.1.0/24 as a free IP subnet that users can access before they
pass 802.1X authentication.
<HUAWEI> system-view
[HUAWEI] dot1x free-ip 192.168.1.0 24
Related Topics
13.5.84 dot1x url
13.5.34 display dot1x
The undo dot1x handshake command disables the device from sending
handshake packets to online 802.1X users.
By default, the device handshake function is disabled for online 802.1X users.
Format
dot1x handshake
undo dot1x handshake
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
To check whether an 802.1X user is online in real time, you can run the dot1x
handshake command to enable the device to send handshake packets to the
802.1X user. The device sends handshake request packets to the user. If the user
sends a response packet within the handshake interval (set using the 13.5.80
dot1x timer command), the device considers that the user is online. If the user
does not send any response packet within the interval, the device considers that
the user is offline.
NOTE
If a client does not support the handshake function, the device will not receive handshake
response packets within the handshake interval and considers that the user is offline.
Therefore, disable the device from sending handshake packets to an online 802.1X user
when the user's client does not support the handshake function.
After the 13.5.80 dot1x timer arp-detect arp-detect-value command is executed to
configure ARP detection, the handshake function between the device and online 802.1X
users does not take effect.
Example
# Enable the device to send handshake packets to online 802.1X users.
<HUAWEI> system-view
[HUAWEI] dot1x handshake
Related Topics
13.5.63 dot1x enable
13.5.34 display dot1x
The undo dot1x handshake packet-type command restores the default type of
802.1X authentication handshake packets.
Format
dot1x handshake packet-type { request-identity | srp-sha1-part2 }
Parameters
Parameter Description Value
request-identity Indicates that the type of 802.1X authentication -
handshake packets is request-identity.
srp-sha1-part2 Indicates that the type of 802.1X authentication -
handshake packets is srp-sha1-part2.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
During 802.1X authentication, different vendors' devices support different
handshake packet types. By default, the device uses 802.1X authentication
handshake packets of the request-identity type. If a device connected to the non-
Huawei device uses the 802.1X authentication handshake packets of the srp-sha1-
part2 type, run the dot1x handshake packet-type command to set the type of
802.1X authentication handshake packets to srp-sha1-part2.
NOTE
The dot1x handshake packet-type command takes effect only for users that log in after
the command is run.
Example
# Set the type of 802.1X authentication handshake packets to srp-sha1-part2.
<HUAWEI> system-view
[HUAWEI] dot1x handshake packet-type srp-sha1-part2
Related Topics
13.5.65 dot1x handshake
Function
The dot1x mac-bypass command enables MAC address bypass authentication on
an interface.
Format
In the system view:
dot1x mac-bypass
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, MultiGE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can enable MAC address bypass authentication for terminals (for example,
printers) on which the 802.1X client software cannot be installed or used.
After MAC address bypass authentication is enabled on the interface using the
dot1x mac-bypass command, the device first performs 802.1X authentication on
users. If the user name request times out, the device starts the MAC address
authentication process for the users. When 802.1X authentication fails, the device
does not start the MAC address authentication process.
NOTE
Prerequisites
802.1X authentication has been enabled globally using the 13.5.63 dot1x enable
command.
Example
# Enable MAC address bypass authentication on GE0/0/1 in the system view.
<HUAWEI> system-view
[HUAWEI] dot1x mac-bypass interface gigabitethernet 0/0/1
Related Topics
13.5.63 dot1x enable
13.5.34 display dot1x
Function
The dot1x mac-bypass access-port command enables MAC address bypass
authentication on all downlink interfaces of the device.
The undo dot1x mac-bypass access-port command disables MAC address bypass
authentication on all downlink interfaces of the device.
Format
dot1x mac-bypass access-port all
undo dot1x mac-bypass access-port all
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can enable MAC address bypass authentication for terminals (such as
printers) on which the 802.1X client software cannot be installed or used.
After MAC address bypass authentication is enabled, the device performs 802.1X
authentication on a user. Once 802.1X authentication fails, the device sends the
user's MAC address as the user name and password to the authentication server.
NOTE
MAC address bypass authentication involves 802.1X authentication. That is, the dot1x mac-
bypass access-port all command also enables 802.1X authentication on the interfaces; the
undo dot1x mac-bypass access-port all command also disables 802.1X authentication on
the interfaces. If 802.1X authentication has been enabled on the interfaces, the
authentication mode on the interfaces is changed to MAC address bypass authentication
after you run the dot1x mac-bypass access-port all command.
Prerequisites
802.1X authentication has been enabled globally and on the interfaces using the
13.5.63 dot1x enable command.
Example
# In the system view, enable MAC address bypass authentication on all downlink
interfaces of the device.
<HUAWEI> system-view
[HUAWEI] dot1x mac-bypass access-port all
The undo dot1x mac-bypass mac-auth-first command disables the device from
performing MAC address authentication first during MAC address bypass
authentication.
By default, the MAC address authentication is not performed first during MAC
address bypass authentication.
Format
In the system view:
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, MultiGE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When both the clients that do not support 802.1X authentication (such as
printers) and the clients that support 802.1X authentication (such as PCs) are
connected to the interface enabled with MAC address bypass authentication, you
can run the dot1x mac-bypass mac-auth-first command to enable the device to
perform MAC address authentication first during MAC address bypass
authentication. After that, the device first starts the MAC address authentication
process for users, and triggers 802.1X authentication only if MAC address
authentication fails.
Prerequisites
802.1X authentication has been enabled globally and on an interface using the
13.5.63 dot1x enable command.
Follow-up Procedure
Run the dot1x mac-bypass command to enable MAC address bypass
authentication on the interface.
Example
# Enable the device to first perform MAC address authentication on GE0/0/1
during MAC address bypass authentication in the system view.
<HUAWEI> system-view
[HUAWEI] dot1x mac-bypass mac-auth-first interface gigabitethernet 0/0/1
Related Topics
13.5.63 dot1x enable
13.5.67 dot1x mac-bypass
Format
In the system view:
dot1x max-user user-number interface { interface-type interface-number1 [ to
interface-number2 ] } &<1-10>
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, MultiGE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To limit the maximum number of 802.1X authentication users allowed on an
interface, run the dot1x max-user command.
Prerequisites
The 802.1X authentication function has been enabled globally and on an interface
using the 13.5.63 dot1x enable command.
Precautions
If the user access mode on an interface is interface-based (configured using the
dot1x port-method command), the maximum number of 802.1X authentication
users allowed on the interface is 1. Before running the dot1x max-user command
to set the maximum number of 802.1X authentication users allowed on the
interface, run the undo dot1x port-method command to restore the user access
mode on the interface to MAC address-based.
Example
# In the system view, set the maximum number of 802.1X authentication users
allowed on GE0/0/1 to 7.
<HUAWEI> system-view
[HUAWEI] dot1x max-user 7 interface gigabitethernet 0/0/1
# In the interface view, set the maximum number of 802.1X authentication users
allowed on GE0/0/1 to 7.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] dot1x max-user 7
Related Topics
13.5.63 dot1x enable
13.5.74 dot1x port-method
13.5.34 display dot1x
Format
dot1x mc-trigger
undo dot1x mc-trigger
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If a client (for example, the built-in 802.1X client of the Windows operating
system) cannot send an EAPOL-Start packet to perform 802.1X authentication, you
can enable multicast-triggered 802.1X authentication. After that, the device
multicasts an Identity EAP-Request frame to the client to trigger authentication.
Prerequisites
802.1X authentication has been enabled globally and on the interface using the
dot1x enable command.
Example
# Enable multicast-triggered 802.1X authentication.
<HUAWEI> system-view
[HUAWEI] dot1x mc-trigger
Related Topics
13.5.63 dot1x enable
Function
The dot1x mc-trigger port-up-send enable command enables the function of
triggering 802.1X authentication through multicast packets immediately after an
interface goes Up.
The undo dot1x mc-trigger port-up-send enable command disables the function
of triggering 802.1X authentication through multicast packets immediately after
an interface goes Up.
Format
dot1x mc-trigger port-up-send enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Precautions
When the access control mode on the device interface is based on the MAC
address, the dot1x mc-trigger port-up-send enable command does not take
effect.
Example
# Enable the function of triggering 802.1X authentication through multicast
packets immediately after an interface goes Up.
<HUAWEI> system-view
[HUAWEI] dot1x mc-trigger port-up-send enable
Function
The dot1x port-control command sets the authorization state of an interface.
The undo dot1x port-control command restores the default authorization state
of an interface.
Format
In the system view:
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, MultiGE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The auto mode is recommended. Only authenticated users can access network
resources. To trust all users on an interface without authentication, configure the
authorized-force mode. To disable access rights of all users on an interface to
ensure security, configure the unauthorized-force mode.
Prerequisites
802.1X authentication has been enabled globally and on an interface using the
13.5.63 dot1x enable command.
Precautions
When there are online 802.1X users on an interface, the dot1x port-control
command must not be run; otherwise, the system displays alarm information.
It is recommended that you set the authorization state of an interface in the early
stage of network deployment. When the network is running properly, run the cut
access-user command to disconnect all users from the interface before changing
the authorization state.
Example
# Set the authorization state of GE0/0/1 to unauthorized-force in the system
view.
<HUAWEI> system-view
[HUAWEI] dot1x port-control unauthorized-force interface gigabitethernet 0/0/1
Related Topics
13.5.63 dot1x enable
13.5.34 display dot1x
Format
In the system view:
dot1x port-method { mac | port } interface { interface-type interface-number1
[ to interface-number2 ] } &<1-10>
undo dot1x port-method interface { interface-type interface-number1 [ to
interface-number2 ] } &<1-10>
In the interface view:
dot1x port-method { mac | port }
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, MultiGE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
● When the mac method is used, all 802.1X users on an interface are
authenticated one by one. If a user goes offline, other users on this interface
are not affected. The mac method is applicable to individual users.
● When the port method is used, all the other 802.1X users on an interface can
use network resources as long as one user is authenticated successfully. When
the authenticated user goes offline, other users cannot use network resources.
The port method is applicable to group users.
Prerequisites
802.1X authentication has been enabled globally and on an interface using the
13.5.63 dot1x enable command.
Precautions
● When there are online 802.1X users on an interface, do not run the dot1x
port-method command to change the access control method on the
interface.
● If the access control method of an interface is set to port, only one 802.1X
users can access the interface. After you run the undo dot1x port-method
command, MAC address-based access control is enabled, but still only one
user can access the interface. You can run the 13.5.70 dot1x max-user
command to increase the maximum number of 802.1X users as required.
Example
# Set the 802.1X access control method on GE0/0/1 in the system view to port.
<HUAWEI> system-view
[HUAWEI] dot1x port-method port interface gigabitethernet 0/0/1
# Set the 802.1X access control method on GE0/0/1 in the interface view to port.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] dot1x port-method port
Related Topics
13.5.63 dot1x enable
13.5.70 dot1x max-user
13.5.34 display dot1x
Format
dot1x quiet-period
undo dot1x quiet-period
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the quiet timer function is enabled, if the number of authentication failures
of an 802.1X user exceeds a specified value (set using the 13.5.76 dot1x quiet-
times command) within 60 seconds, the user enters a quiet period. During the
quiet period, the device discards the 802.1X authentication request packets from
the user. This prevents the impact on the system due to frequent user
authentication.
The value of the quiet timer is set using the 13.5.80 dot1x timer command. When
the quiet timer expires, the device re-authenticates the user.
Precautions
To make the configuration take effect, run the 13.5.63 dot1x enable command
twice to enable global and interface-based 802.1X user authentication.
Example
# Enable the quiet timer.
<HUAWEI> system-view
[HUAWEI] dot1x quiet-period
Related Topics
13.5.76 dot1x quiet-times
Format
dot1x quiet-times fail-times
undo dot1x quiet-times
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After the quiet timer function of the device is enabled using the 13.5.75 dot1x
quiet-period command, if the number of authentication failures of an 802.1X user
exceeds the value that is set using the dot1x quiet-times command within 60
seconds, the user enters the quiet state. This prevents the impact on the system
due to frequent user authentication.
Example
# Set the maximum number of authentication failures within 60 seconds to 4.
<HUAWEI> system-view
[HUAWEI] dot1x quiet-times 4
Related Topics
13.5.75 dot1x quiet-period
Format
In the system view:
dot1x reauthenticate
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, MultiGE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the user goes online, the device saves user authentication information. After
802.1X re-authentication is enabled using the dot1x reauthenticate command,
the device sends the stored authentication information of the online user to the
authentication server for re-authentication at an interval. If the authentication
information of the user does not change on the authentication server, the user is
online normally. If the authentication information has been changed, the user is
forced to go offline. The user then needs to be re-authenticated according to the
changed authentication information.
NOTE
The re-authentication interval is set using the 13.5.81 dot1x timer reauthenticate-period
command.
This function takes effect only for users who go online after this function is successfully
configured.
If the device is connected to a server for re-authentication and the server replies with a re-
authentication deny message that makes an online user go offline, it is recommended that
you locate the cause of the re-authentication failure on the server or disable the re-
authentication function on the device.
Precautions
If the device is connected to a server for re-authentication and the server replies
with a re-authentication deny message that makes an online user go offline, it is
recommended that you locate the cause of the re-authentication failure on the
server or disable the re-authentication function on the device.
Example
# Enable periodic 802.1X re-authentication on GE0/0/1 in the system view.
<HUAWEI> system-view
[HUAWEI] dot1x reauthenticate interface gigabitethernet 0/0/1
Related Topics
13.5.80 dot1x timer
13.5.34 display dot1x
Function
The dot1x reauthenticate mac-address command enables re-authentication for
an online 802.1X user with the specified MAC address.
Format
dot1x reauthenticate mac-address mac-address
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
For details, see dot1x reauthenticate.
The dot1x reauthenticate mac-address and dot1x reauthenticate commands
re-authenticate online 802.1X users and their difference is as follows:
● The dot1x reauthenticate mac-address command configures the device to
re-authenticate a specified user for once.
● The dot1x reauthenticate command configures the device to re-authenticate
all users on a specified interface at intervals.
Example
# Enable re-authentication for an 802.1X user with the MAC address of 00e0-
fc01-0005.
<HUAWEI> system-view
[HUAWEI] dot1x reauthenticate mac-address 00e0-fc01-0005
Related Topics
13.5.34 display dot1x
13.5.63 dot1x enable
13.5.77 dot1x reauthenticate
13.5.80 dot1x timer
Format
dot1x retry max-retry-value
undo dot1x retry
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
If the device does not receive any response from a user within a specified time
after sending an authentication request or handshake packet to the user, the
device sends the authentication request or handshake packet again. If the
authentication request or handshake packet has been sent for the maximum
retransmission times and no response is received, the user authentication or
handshake fails. In this process, the total number of authentication requests or
handshake packets sent by the device is max-retry-value plus 1.
NOTE
● After you run the dot1x retry command, the setting takes effect on all interfaces
enabled with 802.1X authentication.
● Repeated authentication requests occupy a lot of system resources. When using the
dot1x retry command, you can set the maximum number of times according to user
requirements and device resources. The default value is recommended.
● The interval for sending authentication requests is set using the 13.5.80 dot1x timer
command. The interval for sending authentication requests to offline users is controlled
by the tx-period and client-timeout timer, and the interval for sending authentication
requests to online users is controlled by the handshake-period timer.
● The dot1x retry command is used together with the guest VLAN function (for details,
see 13.5.13 authentication guest-vlan). If a user does not respond within the specified
maximum number of times, the user is added to the guest VLAN so that the user can
access resources in the guest VLAN without being authenticated.
Example
# Set the number of times an authentication request or handshake packet can be
retransmitted to 802.1X users to 4.
<HUAWEI> system-view
[HUAWEI] dot1x retry 4
Related Topics
13.5.63 dot1x enable
13.5.34 display dot1x
13.5.80 dot1x timer
13.5.65 dot1x handshake
Function
The dot1x timer command sets values of timers used in 802.1X authentication.
The undo dot1x timer command restores the default settings of timers used in
802.1X authentication.
By default, the values of timers used in 802.1X authentication are not set.
Format
dot1x timer { arp-detect arp-detect-value | client-timeout client-timeout-value |
handshake-period handshake-period-value | eth-trunk-access handshake-period
handshake-period-value | quiet-period quiet-period-value | tx-period tx-period-
value | mac-bypass-delay delay-time-value | free-ip-timeout free-ip-time-value }
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
During 802.1X authentication, multiple timers implement systematic interactions
between access users, access devices, and the authentication server. You can
change the values of the timers using the dot1x timer command to adjust the
interaction process. (The values of some timers cannot be changed.) This
command is necessary in special network environments. Generally, the default
settings of the timers are recommended.
The ARP probe function can also be implemented by detecting whether there is
user traffic on the access device. If the ARP probe interval is n, the device detects
user traffic at n and 2n. The following uses the 0-n period as an example. The
process during the n-2n period is the same as that during 0-n. (This process
applies only to users who go online from the S5720EI, S5720HI, S6720EI, and
S6720S-EI. Other device models do not support user traffic detection, and they
send ARP probe packets at n and 2n.)
● If user traffic passes through the device within the 0-n period, the device
considers that the user is online at n, and will not send ARP probe packets.
Additionally, the device resets the ARP probe interval.
● If no user traffic passes through the device within the 0-n period, the device
cannot determine whether the user is online at n. In this case, the device
sends an ARP probe packet. If the device receives an ARP reply packet from
the user, it considers the user online and resets the ARP probe interval. If no
ARP reply packet is received, the device considers the user offline.
● If user traffic passes through the device or the device receives an ARP reply
packet from the user within the 2n-3n period, the device considers that the
user is online at 3n and resets the ARP probe interval.
● If no user traffic passes through the device and the device receives no ARP
reply packet from the user within the 2n-3n period, the device cannot
determine whether the user is online at 3n and considers the user offline.
If the device considers that the user is offline at n, 2n, and 3n, the device deletes
all entries related to the user. To prevent the user from going offline unexpectedly
when no operation is performed on the PC, do not set a short ARP probe interval.
Example
# Set the timeout interval of the authentication response from the client to 90s.
<HUAWEI> system-view
[HUAWEI] dot1x timer client-timeout 90
Related Topics
13.5.63 dot1x enable
13.5.65 dot1x handshake
13.5.75 dot1x quiet-period
13.5.34 display dot1x
Format
dot1x timer reauthenticate-period reauthenticate-period-value
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, MultiGE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
After enabling the re-authentication function for online 802.1X authentication
users using the 13.5.77 dot1x reauthenticate command, run the dot1x timer
reauthenticate-period command to set the re-authentication interval. The device
then authenticates online users at the specified interval, ensuring that only
authorized users can keep online.
If the command is executed in the system view, the function takes effect on all
interfaces. If the command is executed in both system view and interface view, the
function takes effect on the interface.
NOTE
It is recommended that the re-authentication interval be set to the default value. If multiple
ACLs need to be delivered during user authorization, you are advised to disable the re-
authentication function or set a longer re-authentication interval to improve the device's
processing performance.
In remote authentication and authorization, if the re-authentication interval is set to a shorter
time, the CPU usage may be higher.
To reduce the impact on the device performance when many users exist, the user re-
authentication interval may be longer than the configured re-authentication interval.
Example
# Set the 802.1X re-authentication interval to 7200 seconds.
<HUAWEI> system-view
[HUAWEI] dot1x timer reauthenticate-period 7200
Related Topics
13.5.77 dot1x reauthenticate
Format
dot1x trigger dhcp-binding
undo dot1x trigger dhcp-binding
Parameters
None
Views
Ethernet interface view, GE interface view, MultiGE interface view, XGE interface
view, 40GE interface view, Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Scenario
There are unauthorized users who modify their MAC addresses to those of
authorized users. After authorized users are connected through 802.1X
authentication, the unauthorized users can obtain the same identities as the
authorized users and connect to the network without authentication. This results
in security risks of authentication and accounting. After accessing the network,
unauthorized users can also initiate ARP spoofing attacks by sending bogus ARP
packets. In this case, the device records incorrect ARP entries, greatly affecting
normal communication between authorized users. To prevent the previous attacks,
configure IPSG and DAI. These two functions are implemented based on binding
tables. For static IP users, you can run the user-bind static command to configure
the static binding table. However, if there are many static IP users, it takes more
time to configure static binding entries one by one.
To reduce the workload, you can configure the device to automatically generate
the DHCP snooping binding table for static IP users. After the static IP users who
pass 802.1X authentication send EAP packets to trigger generation of the user
information table, the device automatically generates the DHCP snooping binding
table based on the MAC address, IP address, and interface recorded in the table.
You can run the display dhcp snooping user-bind command to check the DHCP
snooping binding table that is generated by the device for static IP users who pass
802.1X authentication. The DHCP snooping binding table generated using this
function will be deleted after the users are disconnected.
Follow-up Procedure
Configure IPSG and DAI after the DHCP snooping binding table is generated,
prevent attacks from unauthorized users.
● In the interface view, run the ip source check user-bind enable command to
enable IPSG.
● In the interface view, run the arp anti-attack check user-bind enable
command to enable DAI.
Precautions
● Before configuring the device to generate the DHCP snooping binding table
for static IP users, you must have enabled 802.1X authentication and DHCP
snooping globally and on interfaces using the dot1x enable and dhcp
snooping enable commands.
● The EAP protocol does not specify a standard attribute to carry IP address
information. Therefore, if the EAP request packet sent by a static IP user does
not contain an IP address, the IP address information in the DHCP snooping
binding table is obtained from the user' first ARP request packet with the
same MAC address as the user information table after the user passes
authentication. On a network, unauthorized users may forge authorized users'
MAC addresses to initiate ARP snooping attacks to devices, and the DHCP
snooping binding table generated accordingly may be unreliable. Therefore,
the dot1x trigger dhcp-binding command is not recommended and you are
advised to run the user-bind static command to configure the static binding
table.
● For users who are assigned IP addresses using DHCP, you do not need to run
the dot1x trigger dhcp-binding command on the device. The DHCP snooping
binding table is generated through the DHCP snooping function.
Example
# Enable the device to automatically generate the DHCP snooping binding table
after static IP users pass 802.1X authentication.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] dot1x trigger dhcp-binding
Format
In the system view:
dot1x unicast-trigger interface { interface-type interface-number1 [ to interface-
number2 ] } &<1-10>
undo dot1x unicast-trigger interface { interface-type interface-number1 [ to
interface-number2 ] } &<1-10>
In the interface view:
dot1x unicast-trigger
undo dot1x unicast-trigger
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, MultiGE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
After the dot1x unicast-trigger command is used on the device, the device sends
a unicast packet to respond to the received ARP or DHCP Request packet from a
client. If the client does not respond within the timeout interval (set by the
13.5.80 dot1x timer command), the device retransmits the unicast packet (the
maximum of retransmission count is set by the 13.5.79 dot1x retry command).
During 802.1X-based network deployment, 802.1X users can start 802.1X
authentication without installing specified client dial-in software, which facilitates
network deployment.
NOTE
The dot1x unicast-trigger command has the same function as the 13.5.60 dot1x dhcp-
trigger command.
Example
# Enable 802.1X authentication triggered by unicast packets on GE0/0/1 in the
system view.
<HUAWEI> system-view
[HUAWEI] dot1x unicast-trigger interface gigabitethernet 0/0/1
Related Topics
13.5.60 dot1x dhcp-trigger
Format
dot1x url url-string
undo dot1x url
Parameters
Parameter Description Value
url-string Specifies the redirect-to The value is a string of 1 to 200 case-
URL. sensitive characters.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Follow-up Procedure
Run the dot1x free-ip command to configure a free IP subnet where the redirect-
to URL of the 802.1X user is located. To ensure that pre-connection users can be
aged out normally, you need to run the 13.5.80 dot1x timer free-ip-timeout
command to set the aging time of authentication-free user entries.
Precautions
The redirect-to URL must be within the free IP subnet. Otherwise, the URL is
inaccessible.
Example
# Configure the redirect-to URL in 802.1X authentication to http://www.***.com.cn.
<HUAWEI> system-view
[HUAWEI] dot1x url http://www.***.com.cn
Related Topics
13.5.64 dot1x free-ip
13.5.34 display dot1x
13.5.85 force-push
Function
The force-push command enables the forcible URL template or URL push
function.
The undo force-push command disables the forcible URL template or URL push
function.
Format
force-push { url-template template-name | url url-address }
undo force-push
Parameters
Parameter Description Value
Views
AAA domain view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
After a user is successfully authenticated, the device forcibly redirect the user to a
web page when receiving the HTTP packet from the user who accesses web pages
for the first time. In addition to pushing advertisement pages, the device can
obtain user terminal information through the HTTP packets sent by the users, and
apply the information to other services. There are two ways to push web pages:
1. URL: pushes the URL corresponding to the web page.
2. URL template: pushes the URL template. A URL template must be created.
The URL template contains the URL of the pushed web page and URL
parameters.
Prerequisites
The URL configured using the 13.5.151 url (URL template view) command in the
URL template view cannot be a redirection URL; otherwise, the command does not
take effect.
Precautions
For the S5720HI, the forcible push function takes effect only for the first HTTP or
HTTPS packet received from the user. If an application program that actively sends
HTTP or HTTPS packets is installed on the user terminal, the terminal has sent the
HTTP or HTTPS packet before the user accesses a web page. Therefore, the user is
unaware of the web page push process.
The forcible push function takes effect only when a redirection ACL is configured
for switches excluding the S5720HI. If a redirection ACL exists in the user table, a
web page is forcibly pushed when HTTP packets from users match the redirection
ACL rule. Usually, you can configure the RADIUS server to authorize the Huawei
extended RADIUS attribute HW-Redirect-ACL to users for redirection ACL
implementation, or run the 13.1.72 redirect-acl command to configure a
redirection ACL.
When an IPv4 redirect ACL is configured for an IPv6 user or an IPv6 redirect ACL is
configured for an IPv4 user, the Push URL content field in the 13.5.31 display
access-user command output displays the pushed URL, but the browser of the
user cannot redirect to the pushed URL.
Switches except the S5720HI do not support concurrent use of the pushed URL
and redirection ACL6 functions. If both functions are configured, the Push URL
content field in the 13.4.55 display access-user command output displays the
pushed URL; however, the terminal browser cannot be redirected to the pushed
URL.
Example
# Push the URL template abc in the domain huawei.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] domain huawei
[HUAWEI-aaa-domain-huawei] force-push url-template abc
Related Topics
13.5.151 url (URL template view)
Function
The http get-method enable command configures the device to allow users to
submit user name and password information to the device in GET mode during
Portal authentication.
The undo http get-method enable command restores the default setting.
By default, the device does not allow users to submit user name and password
information to the device in GET mode during Portal authentication.
Format
http get-method enable
Parameters
None
Views
Portal server template view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
By default, the device does not allow users to submit user name and password
information to the device in GET mode during Portal authentication. You can run
the http get-method enable command to configure the device to allow users to
submit user name and password information to the device in GET mode during
Portal authentication.
Precautions
The GET mode has the risk of password disclosure. Therefore, the POST mode is
recommended.
This command only applies to scenarios in which HTTP or HTTPS is used for Portal
connection establishment.
Example
# Configure the device to allow users to submit user name and password
information to the device in GET mode during Portal authentication.
<HUAWEI> system-view
[HUAWEI] web-auth-server abc
[HUAWEI-web-auth-server-abc] http get-method enable
Format
http-method post { cmd-key cmd-key [ login login-key | logout logout-key ] * |
init-url-key init-url-key | login-fail response { err-msg { authenserve-reply-
Parameters
Parameter Description Value
Views
Portal server template view
Default Level
2: Configuration level
Usage Guidelines
When the device uses the HTTP or HTTPS protocol to communicate with the
Portal server, a user sends POST request packets (carrying parameters such as the
user name and MAC address) to the device as required by the Portal server. After
receiving the POST request packets, the device parses parameters in the packets. If
identification keywords of the parameters differ from those configured on the
device, the user authentication fails. Therefore, you need to run the http-method
post command to configure the identification keywords based on the Portal server
configuration.
After successful user login or logout, or a user login or logout failure, the device
sends the login or logout result to the user based on the http-method post
Example
# Set the command identification keyword to cmd1 for parsing POST request
packets of the HTTP or HTTPS protocol.
<HUAWEI> system-view
[HUAWEI] web-auth-server abc
[HUAWEI-web-auth-server-abc] http-method post cmd-key cmd1
13.5.88 mac-authen
Function
The mac-authen command enables MAC address authentication globally or on an
interface.
The undo mac-authen command disables MAC address authentication globally or
on an interface.
By default, MAC address authentication is disabled globally and on an interface.
NOTE
Only S5720EI, S1720X, S1720X-E, S5720HI, S5720S-SI, S5720SI, S5730S-EI, S5730SI, S6720LI,
S6720S-LI, S6720S-SI, S6720SI, S6720EI, and S6720S-EI support configuration of MAC
address authentication on VLANIF interfaces.
Format
In the system view:
mac-authen [ interface { interface-type interface-number1 [ to interface-
number2 ] } &<1-10> ]
undo mac-authen [ interface { interface-type interface-number1 [ to interface-
number2 ] } &<1-10> ]
In the interface view:
mac-authen
undo mac-authen
Parameters
Parameter Description Value
Views
System view, VLANIF interface view, Ethernet interface view, GE interface view,
MultiGE interface view, XGE interface view, 40GE interface view, Eth-Trunk
interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
MAC address authentication controls network access rights of a user based on the
user's access interface and MAC address. During MAC address authentication, the
user name and password are the user's MAC address. MAC address authentication
is applicable to the scenario where MAC addresses are unchanged and high
security is not required, and is used to authenticate terminals such as printers
where the authentication client cannot be installed.
If you run the mac-authen command in the system view without any interfaces
specified, MAC address authentication is enabled globally. The configurations of
MAC address authentication take effect only after global MAC address
authentication is enabled. MAC address bypass authentication is not controlled by
this command.
To enable MAC address authentication on an interface, you can perform either of
the following operations:
● Run the mac-authen command in the interface view.
● Run the mac-authen interface { interface-type interface-number1 [ to
interface-number2 ] } &<1-10> command in the system view.
Precautions
● Before running the undo mac-authen command, ensure that there is no
online MAC address authentication user; otherwise, you cannot run this
command. Online MAC address authentication users do not include online
users using MAC address bypass authentication.
Command Function
Example
# Enable global MAC address authentication.
<HUAWEI> system-view
[HUAWEI] mac-authen
Related Topics
13.5.63 dot1x enable
13.5.38 display mac-authen
13.5.91 mac-authen domain
13.5.92 mac-authen max-user
13.5.96 mac-authen reauthenticate
13.5.99 mac-authen timer
13.5.101 mac-authen username
Format
In the system view:
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, MultiGE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After MAC address authentication is enabled, the device can trigger MAC address
authentication on users by default when receiving DHCP/ARP/DHCPv6/ND
packets. Based on user information on the actual network, the administrator can
adjust the packet types that can trigger MAC address authentication. For example,
if all users on a network dynamically obtain IPv4 addresses, the device can be
configured to trigger MAC address authentication only through DHCP packets.
This prevents the device from continuously sending ARP packets to trigger MAC
address authentication when static IPv4 addresses are configured for unauthorized
users on the network, and reduces device CPU occupation.
Precautions
Example
# Configure the device to trigger MAC address authentication only through DHCP
packets in the system view.
<HUAWEI> system-view
[HUAWEI] mac-authen dhcp-trigger
Related Topics
13.5.88 mac-authen
Function
The mac-authen dhcp-trigger dhcp-option command enables the device to send
DHCP option information to the authentication server when triggering MAC
address authentication through DHCP packets.
By default, the device does not send DHCP option information to the
authentication server when triggering MAC address authentication through DHCP
packets.
Format
In the system view:
Parameters
Parameter Description Value
option-code Specifies the option that the device The value is
sends to the authentication server. fixed as 82.
Views
System view, Ethernet interface view, GE interface view, MultiGE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
Option82 record information about DHCP user locations and services (voice and
data services). After this command is run, if the device supports the function of
triggering MAC address authentication though DHCP packets, it sends Option82
information to the authentication server when triggering MAC address
authentication through DHCP packets. Based on the user information recorded in
Option82, the authentication server then assigns different network access rights to
users with different services in different locations. This implements accurate
control on the network access right of each user.
Example
# Globally enable the device to send Option82 information to the authentication
server when triggering MAC address authentication through DHCP packets.
<HUAWEI> system-view
[HUAWEI] mac-authen dhcp-trigger dhcp-option 82
Related Topics
13.5.88 mac-authen
Function
The mac-authen domain command configures an authentication domain for
MAC address authentication users.
The default authentication domain for MAC address authentication users is the
global default domain.
NOTE
Only S5720EI, S1720X, S1720X-E, S5720HI, S5720S-SI, S5720SI, S5730S-EI, S5730SI, S6720LI,
S6720S-LI, S6720S-SI, S6720SI, S6720EI, and S6720S-EI support configuration of MAC
address authentication on VLANIF interfaces.
Format
In the system view:
Parameters
Parameter Description Value
Views
System view, VLANIF interface view, Ethernet interface view, GE interface view,
MultiGE interface view, XGE interface view, 40GE interface view, Eth-Trunk
interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When user names for MAC address authentication do not contain domain names,
the device authenticates users using the default domain if no authentication
domain is configured on the device or interface. The authentication scheme is not
flexible because all users are authenticated in the default domain. The mac-
authen domain command specifies the authentication domains for MAC address
authentication users. Different interfaces can be located in different
authentication domains. This command can specify the authentication domains
for the specified MAC addresses. Therefore, this command allows users with
different authentication requirements to adopt various authentication schemes.
NOTE
● If the user name contains a domain name (configured using 13.5.101 mac-authen
username), the user is authenticated in this domain.
● The specified user names and domain names must be the same as those configured in
the AAA view.
● The authentication schemes in the domains are configured in the AAA view.
Prerequisites
The domain to be configured as an authentication domain has been created using
the domain (AAA view) command.
MAC address authentication has been enabled globally and on an interface using
the 13.5.88 mac-authen command.
Precautions
If authentication domains are configured in both the system view and interface
view, the domain configured in the interface view takes effect. If no authentication
domain is configured in the interface view, the domain configured in the system
view takes effect.
You must specify a unicast MAC address in the mac-authen domain command. A
user with an all-0 MAC address is not authenticated.
The configured authentication domain is applied to the MAC addresses calculated
with the mask. Therefore, the undo mac-authen domain command will delete
the authentication domain of the calculated MAC addresses. Before running the
undo mac-authen domain command, run the display this command to view the
calculated MAC addresses.
On a network configured with both 802.1X authentication and MAC address
bypass authentication, an 802.1X user failing the 802.1X authentication will be
Example
# Configure the cams domain as the authentication domain for MAC address
authentication users in the system view.
<HUAWEI> system-view
[HUAWEI] mac-authen domain cams
# Configure the cams domain as the authentication domain for MAC address
authentication users in the interface view.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] mac-authen domain cams
Related Topics
13.5.88 mac-authen
13.1.47 domain (AAA view)
13.5.38 display mac-authen
13.5.101 mac-authen username
Function
The mac-authen max-user command sets the maximum number of MAC address
authentication users on an interface.
The undo mac-authen max-user command restores the default value of the
maximum number of MAC address authentication users on an interface.
Format
In the system view:
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, MultiGE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To limit the number of MAC address authentication users on an interface, run the
mac-authen max-user command. When the number of access users on an
interface reaches the limit, the device will not trigger authentication for the users
newly connected to the interface; therefore, these users cannot access the
network.
Prerequisites
MAC address authentication has been enabled globally and on an interface using
the 13.5.88 mac-authen command.
Example
# Set the maximum number of MAC address authentication users on GE0/0/1 to 8
in the system view.
<HUAWEI> system-view
[HUAWEI] mac-authen max-user 8 interface gigabitethernet 0/0/1
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] mac-authen max-user 8
Related Topics
13.5.88 mac-authen
13.5.38 display mac-authen
Format
In the system view:
mac-authen offline dhcp-release interface { interface-type interface-number1
[ to interface-number2 ] } &<1-10>
undo mac-authen offline dhcp-release interface { interface-type interface-
number1 [ to interface-number2 ] } &<1-10>
In the interface view:
mac-authen offline dhcp-release
undo mac-authen offline dhcp-release
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, MultiGE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After MAC address authentication users who send DHCP Release packets go
offline, the corresponding user entries on the device cannot be deleted
immediately. This occupies device resources and possibly prevents other users from
going online. You can run this command to enable the device to clear the user
entries in real time when MAC address authentication users go offline.
Precautions
If the device functions as a DHCP relay agent, configure the DHCP snooping
function on the device; otherwise, this command does not take effect.
Example
# In the system view, enable the device to clear user entries when receiving DHCP
Release packets from MAC address authentication users on GE0/0/1.
<HUAWEI> system-view
[HUAWEI] mac-authen offline dhcp-release interface gigabitethernet 0/0/1
# In the interface view, enable the device to clear user entries when receiving
DHCP Release packets from MAC address authentication users on GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] mac-authen offline dhcp-release
Related Topics
13.5.88 mac-authen
NOTE
Only S5720EI, S1720X, S1720X-E, S5720HI, S5720S-SI, S5720SI, S5730S-EI, S5730SI, S6720LI,
S6720S-LI, S6720S-SI, S6720SI, S6720EI, and S6720S-EI support this command.
Format
mac-authen permit mac-address mac-address mask { mask | mask-length }
undo mac-authen permit mac-address mac-address mask { mask | mask-
length }
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
By default, any new MAC address is allowed for MAC address authentication after
MAC address authentication is enabled on a VLANIF interface. To actually control
the users that can be authenticated using MAC addresses on the VLANIF interface,
use this command to specify a MAC address range for MAC address
authentication.
Example
# Set the MAC address to 1011-1111-1111 and the MAC address mask length to
24 for MAC address authentication.
<HUAWEI> system-view
[HUAWEI] interface Vlanif 10
[HUAWEI-Vlanif10] mac-authen permit mac-address 1011-1111-1111 mask 24
Related Topics
13.5.38 display mac-authen
13.5.91 mac-authen domain
Format
mac-authen quiet-times fail-times
undo mac-authen quiet-times
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Precautions
After the maximum number of authentication failures is set to a value larger than
the configured value, the user in quiet state can initiate reauthentication only
after the quiet period expires. If the user enters an incorrect user name or
password again, the user authentication fails. The device does not quiet the user
but allows the user to initiate reauthentication immediately.
Example
# Set the maximum number of authentication failures within 60 seconds to 4.
<HUAWEI> system-view
[HUAWEI] mac-authen quiet-times 4
Function
The mac-authen reauthenticate command enables periodic MAC address re-
authentication on a specified interface.
Format
In the system view:
mac-authen reauthenticate interface { interface-type interface-number1 [ to
interface-number2 ] } &<1-10>
undo mac-authen reauthenticate interface { interface-type interface-number1
[ to interface-number2 ] } &<1-10>
In the interface view:
mac-authen reauthenticate
undo mac-authen reauthenticate
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, MultiGE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
After modifying the authentication information of an online user on the
authentication server, the administrator needs to re-authenticate the user in real
time to ensure user validity.
After the user goes online, the device saves user authentication information. After
periodic re-authentication for all online MAC address authentication users on a
specified interface is enabled using the mac-authen reauthenticate command,
the device sends the stored authentication information of the online user on the
interface to the authentication server for re-authentication at an interval. If the
user's authentication information does not change on the authentication server,
the user is online normally. If the authentication information has been changed,
the user is forced to go offline. The user then needs to be re-authenticated
according to the changed authentication information.
NOTE
The re-authentication interval is set using the 13.5.100 mac-authen timer reauthenticate-
period command.
This function takes effect only for users who go online after this function is successfully
configured.
If the device is connected to a server for re-authentication and the server replies with a re-
authentication deny message that makes an online user go offline, it is recommended that
you locate the cause of the re-authentication failure on the server or disable the re-
authentication function on the device.
Example
# Enable periodic MAC address re-authentication on GE0/0/1 in the system view.
<HUAWEI> system-view
[HUAWEI] mac-authen reauthenticate interface gigabitethernet 0/0/1
Related Topics
13.5.38 display mac-authen
Format
In the system view:
mac-authen reauthenticate dhcp-renew interface { interface-type interface-
number1 [ to interface-number2 ] } &<1-10>
undo mac-authen reauthenticate dhcp-renew interface { interface-type
interface-number1 [ to interface-number2 ] } &<1-10>
In the interface view:
mac-authen reauthenticate dhcp-renew
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, MultiGE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
After users go online, the administrator may modify the users' authentication
parameters or network access rights on the authentication server. To ensure user
validity or update the users' network access rights in real time, you can run this
command to enable the device to re-authenticate the users when receiving DHCP
lease renewal packets from MAC address authentication users.
NOTE
Example
# In the system view, enable the device to re-authenticate the users when
receiving DHCP lease renewal packets from MAC address authentication users on
GE0/0/1.
<HUAWEI> system-view
[HUAWEI] mac-authen reauthenticate dhcp-renew interface gigabitethernet 0/0/1
# In the interface view, enable the device to re-authenticate the users when
receiving DHCP lease renewal packets from MAC address authentication users on
GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] mac-authen reauthenticate dhcp-renew
Related Topics
13.5.88 mac-authen
Function
The mac-authen reauthenticate mac-address command enables re-
authentication for an online MAC address authentication user with a specified
MAC address.
Format
mac-authen reauthenticate mac-address mac-address
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
For details, see 13.5.96 mac-authen reauthenticate.
Example
# Enable re-authentication for an online MAC address authentication user with
the MAC address 0001-0002-0003.
<HUAWEI> system-view
[HUAWEI] mac-authen reauthenticate mac-address 0001-0002-0003
Related Topics
13.5.38 display mac-authen
Function
The mac-authen timer command configures parameters of timers for MAC
address authentication.
The undo mac-authen timer command restores the default parameter values of
timers for MAC address authentication.
Format
mac-authen timer { guest-vlan reauthenticate-period interval | offline-detect
offline-detect-value | quiet-period quiet-value }
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
During MAC address authentication, multiple timers implement systematic
interactions between access users or devices and the authentication server. You
can change the values of the timers by running the mac-authen timer command
to adjust the interaction process. (The values of some timers cannot be changed.)
This command is necessary in special network environments. Generally, the default
settings of the timers are recommended.
NOTE
If the number of offline detection packets (ARP packets) exceeds the default CAR value, the
detection fails and the users are logged out. (The display cpu-defend statistics command can
be run to check whether ARP request and response packets are lost.) To resolve the problem,
the following methods are recommended:
● Increase the detection interval based on the number of users. The default detection
interval is recommended when there are less than 8000 users; the detection interval should
be no less than 600 seconds when there are more than 8000 users.
● Deploy the port attack defense function on the access device and limit the rate of packets
sent to the CPU.
Example
# Set the value of the quiet timer to 60 seconds.
<HUAWEI> system-view
[HUAWEI] mac-authen timer quiet-period 60
Related Topics
13.5.88 mac-authen
13.5.38 display mac-authen
Format
mac-authen timer reauthenticate-period reauthenticate-period-value
undo mac-authen timer reauthenticate-period
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, MultiGE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
After enabling the re-authentication function for online MAC address
authentication users using the 13.5.96 mac-authen reauthenticate command,
NOTE
It is recommended that the re-authentication interval be set to the default value. If multiple
ACLs need to be delivered during user authorization, you are advised to disable the re-
authentication function or set a longer re-authentication interval to improve the device's
processing performance.
In remote authentication and authorization, if the re-authentication interval is set to a shorter
time, the CPU usage may be higher.
To reduce the impact on the device performance when many users exist, the user re-
authentication interval may be longer than the configured re-authentication interval.
Example
# Set the re-authentication interval for online MAC address authentication users
to 3600 seconds.
<HUAWEI> system-view
[HUAWEI] mac-authen timer reauthenticate-period 3600
Related Topics
13.5.88 mac-authen
13.5.96 mac-authen reauthenticate
NOTE
Only S5720EI, S1720X, S1720X-E, S5720HI, S5720S-SI, S5720SI, S5730S-EI, S5730SI, S6720LI,
S6720S-LI, S6720S-SI, S6720SI, S6720EI, and S6720S-EI support configuration of MAC
address authentication on VLANIF interfaces.
Format
mac-authen username { fixed username [ password cipher password ] |
macaddress [ format { with-hyphen [ normal ] | without-hyphen }
[ uppercase ] [ password cipher password ] ] | dhcp-option option-code
{ circuit-id | remote-id } * [ separate separate ] [ format-hex ] password cipher
password }
Parameters
Parameter Description Value
Views
System view, VLANIF interface view, Ethernet interface view, GE interface view,
MultiGE interface view, XGE interface view, 40GE interface view, Eth-Trunk
interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
MAC address authentication uses three user name formats:
● When the MAC address is used as the user name for MAC address
authentication, the password can be the MAC address or a self-defined
character string.
● When the fixed user name is used for MAC address authentication, the user
uses the fixed user name and password set by the administrator for
authentication.
● When the DHCP option format is used for MAC address authentication, the
device uses the DHCP option it obtains and password set by the administrator
for authentication. In this mode, ensure that the device supports MAC address
authentication triggered through DHCP packets.
By default, the device uses the user's MAC address as the user name and
password, and sends the MAC address to the authentication server for
authentication. Therefore, it is inconvenient to identify and manage users. You can
run the mac-authen username command to configure the fixed name and
password for MAC address authentication users, which facilities user identification
and management.
NOTE
When the user names for MAC address authentication are in the DHCP option format, the DHCP
Option82 cannot be configured in the extend format or a customized format (non-character
string) by using the 14.8.6 dhcp option82 format command.
When the user name format in MAC address authentication is configured, ensure that the
authentication server supports this format.
Example
# Configure the user name to vipuser and the password to pass123 for MAC
address authentication.
<HUAWEI> system-view
[HUAWEI] mac-authen username fixed vipuser password cipher pass123
Related Topics
13.5.38 display mac-authen
13.5.91 mac-authen domain
13.5.102 parameter
Function
The parameter command sets the characters used in URL.
Format
parameter { start-mark parameter-value | assignment-mark parameter-value |
isolate-mark parameter-value } *
Parameters
Parameter Description Value
Views
URL template view
Default Level
2: Configuration level
Usage Guidelines
The parameter command allows you to customize the characters in URL.
For example, if the URL configured by the 13.5.151 url (URL template view)
command in the URL template bound to a Portal server template is http://10.1.1.1,
you can add the user MAC address, user IP address, and device system name to
the URL by specifying the user_mac, user_ip, and device parameters.
When a user with IP address 10.1.1.11 and MAC address 0002-0002-0002 connects
to an access device huawei, the access device redirects the user to http://10.1.1.1?
user_mac=0002-0002-0002&user_ip=10.1.1.11&device=huawei for Portal
authentication. In the redirection URL, ? is the default start character, = is the
default assignment character, & is the delimiter between parameters.
Example
# Change the start character in a URL from # to ?.
<HUAWEI> system-view
[HUAWEI] url-template name huawei
[HUAWEI-url-template-huawei] parameter start-mark #
Format
port { interface-type start-interface-number [ to interface-type end-interface-
number ] } &<1-10> connection-type access
undo port { interface-type start-interface-number [ to interface-type end-
interface-number ] } &<1-10> connection-type access
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
By default, downlink interfaces are access ones and uplink interfaces are non-
access ones. You can run the port connection-type access or undo port
connection-type access command to modify the interface access type. For
example, you can batch configure the downlink interfaces supported by the
device, and run the 13.5.68 dot1x mac-bypass access-port command to enable
MAC address bypass authentication on all the downlink interfaces.
After the default interface access type is modified, the device generates the
interface buildrun information in the system view.
Precautions
If stack interface information exists within the interface range, the command does
not take effect. Therefore, there should be no interface with stack configuration in
the interface range. If the access type of an interface is changed, stack
configuration cannot be performed for the interface. That is, if an interface needs
to be configured as a stack interface, the default interface access type cannot be
modified.
Example
# Configure interfaces as downlink interfaces in the system view.
<HUAWEI> system-view
[HUAWEI] port GigabitEthernet 0/0/1 to GigabitEthernet 0/0/6 connection-type access
Related Topics
13.5.40 display port connection-type access all
Format
port port-number [ all ]
undo port [ all ]
Parameters
Parameter Description Value
port-number Specifies the port number that the Portal server The value is
uses to receive and encapsulate UDP packets from an integer
the device. that ranges
from 1 to
65535. By
default, the
value is
50100.
Views
Portal server template view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After creating a Portal server template on the device using the 13.5.167 web-
auth-server (system view) command, configure parameters for the template.
Run the port command to set the port number that a Portal server uses to receive
notification packets from the device. After receiving a Portal authentication
request packet from a user, the device sends the packet to the Portal server using
the specified destination port number.
Precautions
Ensure that the port number configured on the device is the same as that used by
the Portal server.
Example
# Set the port number that a Portal server uses to receive packets from the device
to 10000 in the Portal server template huawei.
<HUAWEI> system-view
[HUAWEI] web-auth-server huawei
[HUAWEI-web-auth-server-huawei] port 10000
Related Topics
13.5.56 display web-auth-server configuration
13.5.167 web-auth-server (system view)
Function
The portal auth-network command configures a source subnet for Portal
authentication.
The undo portal auth-network command restores the default source subnet for
Portal authentication.
By default, the source subnet for Portal authentication is 0.0.0.0/0, indicating that
users in all subnets must pass Portal authentication.
Format
portal auth-network network-address { mask-length | mask-address }
Parameters
Parameter Description Value
network-address Specifies the IP address of the The value is in dotted
source subnet for Portal decimal notation.
authentication.
mask-length Specifies the mask length. The value is an integer
that ranges from 1 to 32.
mask-address Specifies the mask of the source The value is in dotted
subnet for Portal authentication. decimal notation.
all Deletes all Portal authentication -
subnets.
Views
GE interface view, XGE interface view, 40GE interface view, Eth-Trunk interface
view, VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the source subnet for Portal authentication is configured, only user packets
from the source subnet can trigger Portal authentication. If an unauthenticated
user is not on the source subnet for Portal authentication, the device discards the
user's packets that do not match Portal authentication free rules.
NOTE
Prerequisites
Before running this command on an interface, ensure that the Portal service
template is bound to the interface.
Example
# Set the source subnet for Portal authentication to 192.168.1.0/24 on VLANIF10.
<HUAWEI> system-view
[HUAWEI] web-auth-server huawei
[HUAWEI-web-auth-server-huawei] server-ip 10.1.1.1
[HUAWEI-web-auth-server-huawei] quit
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] web-auth-server huawei layer3
[HUAWEI-Vlanif10] portal auth-network 192.168.1.0 24
Format
portal domain domain-name
undo portal domain
Parameters
Parameter Description Value
domain-name Specifies the forcible The value is a string of 1 to 64 case-
Portal authentication insensitive characters without any space,
domain. asterisk (*), question mark (?), or
quotation mark (").
Views
GE interface view, XGE interface view, 40GE interface view, Eth-Trunk interface
view, VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
To flexibly deploy access policies for Portal authentication users, the administrator
can run the portal domain command to configure a forcible Portal authentication
domain.
After a forcible Portal authentication domain is configured on an interface, the
device uses the specified authentication domain to authenticate, authorize, and
charge Portal authentication users on the interface, ignoring the domain names
carried in the user names. The administrator can specify different authentication
domains for different interfaces as needed.
NOTE
Example
# Set the forcible Portal authentication domain to abc on VLANIF 10.
<HUAWEI> system-view
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] portal domain abc
Format
portal free-rule rule-id { destination { any | ip { ip-address mask { mask-length |
ip-mask } [ tcp destination-port port | udp destination-port port ] | any } } |
source { any | { interface interface-type interface-number | ip { ip-address mask
{ mask-length | ip-mask } | any } | vlan vlan-id } * } } *
Parameters
Parameter Description Value
rule-id Specifies the ID of the Portal The value is an integer
authentication-free rule. of which the range
depends on product
models.
mask ip-mask Specifies the IP address mask. This The value is in dotted
parameter can specify the source or decimal notation.
destination address mask
depending on the keyword.
tcp destination- Specifies the TCP destination port The value is an integer
port port number. that ranges from 1 to
65535.
udp destination- Specifies the UDP destination port The value is an integer
port port number. that ranges from 1 to
65535.
mac mac-address Specifies the MAC address of the The value is in H-H-H
Portal authentication user who is format. An H is a
allowed to access destination hexadecimal number of
network resources without 1 to 4 digits.
authentication.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A user cannot access the network before being authenticated successfully. You can
configure an authentication-free rule for specified users to access certain network
resources without passing the Portal authentication. An authentication-free rule
can be determined by parameters such as the IP address, MAC address, interface,
and VLAN. An authentication-free rule can also be determined by ACL rules. The
destination IP address that users can access without authentication can be
specified in an authentication-free rule defined by either of the two methods. In
addition, the destination domain name that users can access without
authentication can be specified in an authentication-free rule defined by ACL.
Facebook. This requires that the users can access specified websites before
successful authentication. The domain name of a website is easier to remember
than the IP address; therefore, the authentication-free rule defined by ACL can be
configured to enable the users to access the domain names of websites without
authentication.
Precautions
● When multiple authentication-free rules are configured, the system matches
the rules one by one.
● If the vlan parameter determines where users reside for an authentication-
free rule, the Portal server must have been bound to the VLANIF interface of
the VLAN using the 13.5.164 web-auth-server (interface view) command;
otherwise, the configured authentication-free rule does not take effect for
users in the VLAN.
● If you specify both VLAN and interface when running the portal free-rule
command, the interface must belong to the VLAN; otherwise, the
configuration is invalid.
● If you specify the destination port number in an authentication-free rule,
fragmented packets cannot match the rule and cannot be forwarded.
● You can only add or delete rules, but cannot modify the created rules. To
modify a rule with a certain rule-id, run the undo portal free-rule command
to delete the rule and re-configure it.
● To allow Portal authentication users to access the network resources in the
user group, pay attention to the following points:
– The user group has been created before it is referenced by the Portal
authentication-free rule.
– The Portal authentication-free rule takes effect only after the referenced
user group is enabled.
– A user can only join one user group. If multiple rules are configured, the
rule with the smallest rule-id has the highest priority.
– If multiple rules are applied to a user, the Portal authentication-free rule
referencing the user group has the highest priority.
– The rule of the user group can only contain whitelists. That is, the deny
action cannot be used.
– After configuring authorization for a user using the destination user-
group group-name command, you cannot configure authorization in
other modes for the user.
● If a user fails built-in Portal authentication on a Layer 2 interface of the
device (excluding the S5720HI), the user cannot obtain network access rights
defined by the Portal authentication-free rule.
Example
# Enable all Portal users to access the network 10.1.1.1/24 without authentication.
<HUAWEI> system-view
[HUAWEI] portal free-rule 1 destination ip 10.1.1.1 mask 24 source ip any
# Add the devices on network segment 10.2.100.0/24 to the user group static-user
and allow the devices to access all network resources without authentication.
<HUAWEI> system-view
[HUAWEI] acl number 3100
[HUAWEI-acl-adv-3100] rule 5 permit ip source 10.2.100.0 255.255.255.0
[HUAWEI-acl-adv-3100] quit
[HUAWEI] user-group static-user
[HUAWEI-user-group-static-user] acl-id 3100
[HUAWEI-user-group-static-user] quit
[HUAWEI] user-group static-user enable
[HUAWEI] portal free-rule 0 source ip 10.2.100.0 mask 24 destination user-group static-user
Related Topics
13.5.42 display portal free-rule
13.5.164 web-auth-server (interface view)
13.5.156 user-group
13.5.157 user-group enable
Format
portal local-server https ssl-policy policy-name [ port port-num ]
undo portal local-server https
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Compared with the external Portal server, the built-in Portal server is easy to use,
cost-effective, and easy to maintain. After the built-in Portal server is configured,
the external Portal authentication server is not required. When you run the portal
local-server command to enable the built-in Portal server function, configure the
built-in Portal server to use HTTPS to exchange authentication information with
users. HTTPS is a combination of the HTTP and Secure Sockets Layer (SSL)
protocols. If the built-in Portal server is configured to use HTTPS to exchange
authentication information with users, an SSL policy must be configured and the
digital certificate must be loaded.
NOTE
You can run the 13.5.114 portal local-server enable command to enable the Portal
authentication function on the interface only after the built-in Portal server function is
enabled.
Prerequisites
● The IP address for the built-in Portal server has been configured using the
13.5.115 portal local-server ip command.
● An SSL policy has been created using the ssl policy policy-name command in
the system view and the digital certificate has been loaded using the
certificate load command in the SSL policy view.
● Apply to a trusted certificate authority for the certificate that needs to be
loaded for the SSL policy.
Precautions
● When there are online Portal authentication users, the built-in Portal server
function cannot be disabled globally and the SSL policy of the built-in Portal
server cannot be modified.
● The SSL policy referenced by the built-in Portal server cannot be deleted.
● After the built-in Portal server function is enabled globally, the guest VLAN,
critical VLAN, or restrict VLAN cannot be created.
Example
# Enable the built-in Portal server function and set the SSL policy used by the
built-in Portal server to abc.
<HUAWEI> system-view
[HUAWEI] portal local-server https ssl-policy abc
Related Topics
13.5.43 display portal local-server
Format
portal local-server ad-image load ad-image-file
undo portal local-server ad-image load
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
There is a blank area on the login page of the default page package used by the
built-in Portal server. Users can customize this area by loading an advertisement
image file. When the login page needs to be customized based on special
requirements, the administrator can upload the user-defined advertisement image
file to the device and run the portal local-server ad-image load command. After
the advertisement image file is loaded, the user-defined advertisement images are
displayed on the built-in Portal server login page for authentication.
Prerequisites
The user-defined advertisement image file must have been uploaded to the
device.
Example
# Load the advertisement image file ad.png to the built-in Portal server login
page.
<HUAWEI> system-view
[HUAWEI] portal local-server ad-image load flash:/ad.png
Info: The loading process may take a few seconds.Please wait for a moment.
Info: Load web file successfully.
Format
portal local-server anonymous
undo portal local-server anonymous
Parameters
None
Views
VLANIF interface view, Ethernet interface view, GE interface view, MultiGE
interface view, XGE interface view, 40GE interface view, Eth-Trunk interface view,
Port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To provide convenient network services for users in airports, hotels, cafes, or civil
entertainment squares, the anonymous login function can be enabled so that the
users can access the network without entering user names and passwords.
After anonymous login for users in built-in Portal authentication is enabled, users
are redirected to the login page when they log in to the web page for the first
time. To connect to the network, the users only need to accept the agreements,
and click Login.
Precautions
When anonymous login is configured, it is recommended that you set AAA
authentication mode to none authentication.
Example
# Enable anonymous login for users in built-in Portal authentication on VLANIF10.
<HUAWEI> system-view
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] portal local-server anonymous
Related Topics
13.5.114 portal local-server enable
Format
portal local-server authentication-method { chap | pap }
undo portal local-server authentication-method
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Prerequisites
The built-in Portal server function has been enabled globally using the portal
local-server command.
Example
# Configure the built-in Portal server to use PAP to authenticate Portal users.
<HUAWEI> system-view
[HUAWEI] portal local-server authentication-method pap
Related Topics
13.5.43 display portal local-server
Function
The portal local-server background-color command configures the background
color of the built-in Portal server login page.
Format
portal local-server background-color background-color-value
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Users can customize the login page of the default page package used by the built-
in Portal server. The administrator can configure the background color of the login
page.
Example
# Configure the user-defined background color of the built-in Portal server.
<HUAWEI> system-view
[HUAWEI] portal local-server background-color #AABBCC
Format
portal local-server background-image load { background-image-file | default-
image1 }
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Users can customize the login page of the default page package used by the built-
in Portal server. Users can customize background images or select the default
ones. When the background image of the login page needs to be customized
based on special requirements, the administrator can upload the user-defined
background image file to the device and run the portal local-server background-
image load command. After the image is loaded, the user-defined background
image file is displayed on the built-in Portal server login page for authentication.
Prerequisites
The user-defined background image must have been uploaded to the device.
Example
# Load the background image file bg.png to the built-in Portal server login page.
<HUAWEI> system-view
[HUAWEI] portal local-server background-image load flash:/bg.png
Info: The loading process may take a few seconds.Please wait for a moment.
Info: Load web file successfully.
Format
In the system view:
portal local-server enable interface { interface-type interface-number1 [ to
interface-number2 ] } &<1-10>
undo portal local-server enable interface { interface-type interface-number1
[ to interface-number2 ] } &<1-10>
In the interface view:
portal local-server enable
undo portal local-server enable
Parameters
Parameter Description Value
Views
System view, VLANIF interface view, Ethernet interface view, GE interface view,
MultiGE interface view, XGE interface view, 40GE interface view, Eth-Trunk
interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Compared with the external Portal server, the built-in Portal server is easy to use,
cost-effective, and easy to maintain. After built-in Portal authentication is enabled,
the external Portal server is not required. After the built-in Portal server function is
enabled using the 13.5.108 portal local-server command, built-in Portal
authentication must be enabled on the interface using the portal local-server
enable command to authenticate users on the interface.
Prerequisites
Portal authentication has been enabled globally using the portal local-server
command.
Precautions
The portal local-server enable command cannot be used together with the
following commands on the same interface.
Command Function
Example
# Enable built-in Portal authentication on VLANIF 10.
<HUAWEI> system-view
[HUAWEI] interface loopback 1
[HUAWEI-LoopBack1] ip address 10.1.1.1 24
[HUAWEI-LoopBack1] quit
[HUAWEI] portal local-server ip 10.1.1.1
[HUAWEI] ssl policy s1
[HUAWEI-ssl-policy-s1] pki-realm default
[HUAWEI-ssl-policy-s1] quit
[HUAWEI] http secure-server ssl-policy s1
[HUAWEI] portal local-server https ssl-policy s1 port 1025
[HUAWEI] vlan batch 10
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] portal local-server enable
Related Topics
13.5.43 display portal local-server
Format
portal local-server ip ip-address
undo portal local-server ip
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When the device is used as a built-in Portal server, you can run the portal local-
server ip command to configure an IP address for the built-in Portal server. Users
are then redirected to the Portal server if they enter URLs that are not located in
the free IP subnet.
NOTE
● The IP address assigned to the built-in Portal server must have a reachable route to the
user.
● It is recommended that a loopback interface address be assigned to the built-in Portal
server because the loopback interface is stable. Additionally, packets destined for
loopback interfaces are not sent to other interfaces on the network; therefore, system
performance is not deteriorated even if many users request to go online.
● After users go online through the built-in Portal server, if the interface address or
interface (non-physical interface) matching the built-in Portal server's IP address is
deleted, online users cannot go offline and offline users cannot go online. Therefore,
exercise caution when you delete the interface address or interface.
Example
# Assign the IP address 10.1.1.1 to the built-in Portal server.
<HUAWEI> system-view
[HUAWEI] portal local-server ip 10.1.1.1
Related Topics
13.5.43 display portal local-server
Format
portal local-server keep-alive interval interval-value [ auto ]
undo portal local-server keep-alive
Parameters
Parameter Description Value
interval interval- Specifies the heartbeat detection The value is an
value interval of the built-in Portal server. integer that ranges
from 30 to 7200, in
seconds.
auto Specifies the automatic detection -
mode.
If this parameter is not configured, the
forcible detection mode is specified.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a user closes the browser or an exception occurs, the device can detect the
user's online state to determine whether to make the user go offline. The
administrator can configure the heartbeat detection function of the built-in Portal
server. If the device does not receive a heartbeat packet from the client within a
specified period, the user is specified to go offline. The heartbeat detection mode
of the built-in Portal server can be either of the following modes:
● Forcible detection mode: This mode is valid for all users. If the device does not
receive a heartbeat packet from a user within a specified period, the device
specifies the user to go offline.
● Automatic detection mode: The device checks whether the client browser
supports the heartbeat program. If yes, the forcible detection mode is used for
the user; if no, the device does not detect the user. You are advised to
configure this mode to prevent users from going offline because the browser
does not support the heartbeat program.
NOTE
Currently, the heartbeat program is supported by Internet Explorer 8, FireFox 3.5.2, Chrome
28.0.1500.72, and Opera 12.00 on Windows 7.
Browsers using Java1.7 and later versions do not support the heartbeat program.
Precautions
When the forcible detection mode is configured, the device specifies users to go
offline to prevent from failing to receive heartbeat packets for a long time during
network congestion. In this scenario, the heartbeat detection interval must be
increased.
If you run this command multiple times in the same view, only the latest
configuration takes effect.
Example
# Configure the automatic detection function of the built-in Portal server.
<HUAWEI> system-view
[HUAWEI] portal local-server keep-alive interval 60 auto
Function
The portal local-server load command loads a page file package to the built-in
Portal server.
The undo portal local-server load command restores the default configuration.
By default, the built-in Portal server loads the default page file package
portalpage.zip.
Format
portal local-server load string
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Customized page file packages can be loaded to the built-in Portal server.
Prerequisites
The page file (.zip) has been uploaded from the PC to the device storage media.
Precautions
The default page file package can be modified but cannot be deleted. If it is
deleted, the built-in Portal server fails to load the pages after startup.
This function is used by technical support personnel to develop limited page
customization based on customer requirements and does not apply to
customization by customers themselves.
Example
# Load the page file portalpage_01.zip on the built-in Portal server.
<HUAWEI> system-view
[HUAWEI] portal local-server load portalpage_01.zip
Warning: Portal local server has been enabled, and this operation will affect online user, continue?[Y/N]:y
Info: The loading process may take a few seconds.Please wait for a moment
Info: Load web file successfully.
Related Topics
13.5.45 display portal local-server page-information
Format
portal local-server logo load logo-file
undo portal local-server logo load
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
There is a blank area on the login page of the default page package used by the
built-in Portal server. Users can customize this area by loading a logo file. When
the login page needs to be customized based on special requirements, the
administrator can upload the user-defined logo file to the device and run the
portal local-server logo load command. After the logo file is loaded, the user-
defined logo is displayed on the built-in Portal server login page for
authentication.
Prerequisites
The user-defined logo file must have been uploaded to the device.
Example
# Load the logo file logo.png to the built-in Portal server login page.
<HUAWEI> system-view
[HUAWEI] portal local-server logo load flash:/logo.png
Info: The loading process may take a few seconds.Please wait for a moment.
Info: Load web file successfully.
Format
portal local-server page-text load string
undo portal local-server page-text load
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If you need to customize the use instruction page, you can upload the customized
use instruction page file to the device, and run this command to load the file.
After the file is loaded, the hyperlink Instruction for Use is generated on the login
page of the built-in Portal server, and users can click the hyperlink to access the
use instruction page.
Prerequisite
The page file to be loaded has been uploaded to the device.
Precautions
When the to-be-loaded page is customized, the page length and width are fixed.
After adjusting the page, the administrator must upload and load the modified
page again.
Currently, only Chinese or English page files can be loaded on the device.
Example
# Load the use instruction page file page.html to the built-in Portal server.
<HUAWEI> system-view
[HUAWEI] portal local-server page-text load flash:/page.html
Info: The loading process may take a few seconds.Please wait for a moment.
Info: Load web file successfully.
Format
portal local-server policy-text load string
undo portal local-server policy-text load
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To customize a disclaimer page, upload the disclaimer page file to the device and
run this command to load the file. After the file is loaded, the hyperlink
Disclaimer will be displayed on the login page. You can click the link to visit the
disclaimer page.
Prerequisite
The disclaimer page file to be loaded has been uploaded to the device.
Precautions
Currently, only Chinese and English disclaimer page files can be loaded on the
device.
Example
# Load the disclaimer page file policy.html to the built-in Portal server.
<HUAWEI> system-view
[HUAWEI] portal local-server policy-text load policy.html
Info: The loading process may take a few seconds.Please wait for a moment.
Info: Load web file successfully.
Format
portal local-server syslog-limit enable
undo portal local-server syslog-limit enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The device generates logs when users authenticated through the built-in Portal
server fail to go online or offline. If a user fails to go online or offline, the user
attempts to go online or offline repeatedly, and the device generates a large
number of logs within a short time. This results in a high failure rate in the
statistics and degrades the system performance. You can run the portal local-
server syslog-limit enable command to enable the log suppression function for
users authenticated through the built-in Portal server. The device then only
generates one log if a user fails to go online or offline within a suppression period
(configured using the 13.4.159 portal local-server syslog-limit period
command).
Example
# Enable the log suppression function for users authenticated through the built-in
Portal server.
<HUAWEI> system-view
[HUAWEI] portal local-server syslog-limit enable
Format
portal local-server syslog-limit period value
undo portal local-server syslog-limit period
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The device generates logs when users authenticated through the built-in Portal
server fail to go online or offline. If a user fails to go online or offline, the user
attempts to go online or offline repeatedly, and the device generates a large
number of logs within a short time. This results in a high failure rate in the
statistics and degrades the system performance. You can enable the log
suppression function (configured using the 13.4.158 portal local-server syslog-
limit enable command) for users authenticated through the built-in Portal server.
The device then only generates one log if a user fails to go online or offline within
a suppression period.
Example
# Set the log suppression period to 1000 seconds for users authenticated through
the built-in Portal server.
<HUAWEI> system-view
[HUAWEI] portal local-server syslog-limit period 1000
Format
portal local-server timer session-timeout interval
undo portal local-server timer session-timeout
Parameters
Parameter Description Value
interval Specifies the session timeout The value is an integer that
interval for built-in Portal ranges from 1 to 720, in hours.
authentication users.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Scenario
When built-in Portal authentication is used for users and the device functions as a
built-in Portal server, you can configure the session timeout interval for the users.
The users are disconnected after the specified session timeout interval. To connect
to the network again, the users need to be re-authenticated.
Precautions
The session timeout interval for built-in Portal authentication users is calculated
based on the device time. For example, if the session timeout interval is 6 hours
and the device time is 2014-09-01 02:00:00 when a user was connected, the user
should be disconnected at 2014-09-01 08:00:00. Therefore, ensure that the device
time is correct after the session timeout interval is configured for users. If the
device time is incorrect, users may fail to be connected or disconnected properly.
You can run the display clock command to check the device time and the clock
datetime HH:MM:SS YYYY-MM-DD command to configure the time.
Example
# Configure the session timeout interval to 10 hours for built-in Portal
authentication users.
<HUAWEI> system-view
[HUAWEI] portal local-server timer session-timeout 10
Related Topics
13.5.43 display portal local-server
Function
The portal logout different-server enable command configures a device to
process user logout requests sent by a Portal server other than the one from
which users log in.
The undo portal logout different-server enable command restores the default
configuration.
By default, a device does not process user logout requests sent by Portal servers
other than the one from which users log in.
Format
portal logout different-server enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Precautions
The user logout requests that a device can process must be sent by Portal servers
bound to an access interface. These servers include all the Portal servers
configured in the master and backup Portal server templates bound to the
interface.
Example
# Enable a device to process user logout requests a Portal server other than the
one from which users log in.
<HUAWEI> system-view
[HUAWEI] portal logout different-server enable
Related Topics
13.5.41 display portal
Function
The portal logout resend timeout command configures the re-transmission times
and interval for the Portal authentication user logout packet.
The undo portal logout resend timeout command restores the default setting.
Format
portal logout resend times timeout period
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After disconnecting a Portal authentication user, the device sends a user logout
packet (NTF-LOGOUT) to instruct the Portal server to delete the user information.
If the network between the device and Portal server is not stable or packets are
lost, the Portal server may fail to receive the user logout packet from the device
after the Portal authentication user is disconnected. In this case, the user is
displayed as disconnected on the device but still as online on the Portal server. To
enable the Portal server to receive the user logout packet and ensure that the
online user information on the Portal server is correct, the administrator can
enable the user logout packet re-transmission function on the device and
configure the re-transmission times and interval.
Example
# Configure the re-transmission times to 5 and interval to 10 seconds for the
Portal authentication user logout packet.
<HUAWEI> system-view
[HUAWEI] portal logout resend 5 timeout 10
Related Topics
13.5.41 display portal
13.5.47 display portal user-logout
Format
portal max-user user-number
undo portal max-user
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
You can run the portal max-user command to set the maximum number of
concurrent Portal authentication users.
Example
# Set the maximum number of concurrent Portal authentication users to 25.
<HUAWEI> system-view
[HUAWEI] portal max-user 25
The undo portal quiet-period command disables the quiet timer of Portal
authentication.
By default, the quiet timer for Portal authentication is enabled.
Format
portal quiet-period
undo portal quiet-period
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After the portal quiet-period command is used to enable the quiet timer for
Portal authentication. If the number of Portal authentication failures exceeds the
value specified by the 13.5.128 portal quiet-times command, the device keeps
the Portal authentication user in quiet state for a period of time. During the quiet
period, the device discards Portal authentication requests from the user. This
prevents the impact of frequent authentications on the system.
The quiet period for Portal authentication can be set using the 13.5.130 portal
timer quiet-period command. After the quiet period is reached, the device re-
authenticates the user.
Example
# Enable the quiet timer for Portal authentication.
<HUAWEI> system-view
[HUAWEI] portal quiet-period
Related Topics
13.5.128 portal quiet-times
13.5.130 portal timer quiet-period
13.5.46 display portal quiet-user
The undo portal quiet-times command restores the default maximum number of
authentication failures within 60s before a Portal authentication user enters the
quiet state.
By default, the device allows a maximum of ten authentication failures within 60s
before a Portal authentication user enters the quiet state.
Format
portal quiet-times fail-times
undo portal quiet-times
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After the 13.5.127 portal quiet-period command is used to enable the quiet
timer, if the number of Portal authentication failures exceeds the value specified
by the portal quiet-times command, the device keeps the Portal authentication
user in quiet state for a period of time. This prevents the impact of frequent
authentications on the system.
Example
# Set the maximum number of Portal authentication failures within 60 seconds to
4.
<HUAWEI> system-view
[HUAWEI] portal quiet-times 4
Related Topics
13.5.127 portal quiet-period
13.5.130 portal timer quiet-period
13.5.46 display portal quiet-user
Format
portal timer offline-detect time-length
undo portal timer offline-detect
Parameters
Parameter Description Value
time-length Specifies the Portal The value is 0 or an integer that ranges from
user offline detection 30 to 7200, in seconds. The default value is
interval. 300. The value 0 indicates that offline
detection is not performed.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If a Portal user goes offline due to power failure or network interruption, the
device and Portal server may still store the user information, which causes
incorrect accounting. Additionally, a limit number of users can access the device. If
a user goes offline improperly but the device still stores user information, other
users cannot access the network.
After the Portal user offline detection interval is set, if the user does not respond
within the interval, the device considers the Portal user offline. The device and
Portal server then delete the user information and release resources to ensure an
efficient resource use.
Precautions
The portal timer offline-detect command only applies to Layer 2 Portal
authentication.
Example
# Set the Portal user offline detection interval to 400s.
<HUAWEI> system-view
[HUAWEI] portal timer offline-detect 400
Related Topics
13.5.164 web-auth-server (interface view)
Format
portal timer quiet-period quiet-period-value
undo portal timer quiet-period
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After the 13.5.127 portal quiet-period command is used to enable the quiet
timer, run the portal timer quiet-period command to set the quiet period for
Portal authentication. If a Portal authentication user is kept in quiet state, the
device discards Portal authentication requests from the user during the quiet
period.
Example
# Set the quiet period to 2000s.
<HUAWEI> system-view
[HUAWEI] portal timer quiet-period 2000
Related Topics
13.5.127 portal quiet-period
13.5.128 portal quiet-times
13.5.46 display portal quiet-user
NOTE
Format
portal url-encode enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Precautions
After the URL encoding and decoding function is enabled, some servers may not
support the escape characters converted from special characters in redirect URLs.
Therefore, check whether servers support the escape characters before configuring
special characters in redirect URLs.
Example
# Enable URL encoding and decoding.
<HUAWEI> system-view
[HUAWEI] portal url-encode enable
Related Topics
13.5.48 display portal url-encode configuration
Function
The portal user-alarm percentage command sets alarm thresholds for the Portal
authentication user count percentage.
The undo portal user-alarm percentage command restores the default alarm
thresholds for the Portal authentication user count percentage.
By default, the lower alarm threshold for the Portal authentication user count
percentage is 50, and the upper alarm threshold for the Portal authentication user
count percentage is 100.
Format
portal user-alarm percentage percent-lower-value percent-upper-value
Parameters
Parameter Description Value
percent-lower- Specifies the lower alarm The value is an integer that
value threshold for the Portal ranges from 1 to 100.
authentication user count
percentage.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After running the 13.5.126 portal max-user command to set the maximum
number of online Portal authentication users allowed on a device, you can run the
portal user-alarm percentage command to set alarm thresholds for the Portal
authentication user count percentage.
When the percentage of online Portal authentication users against the maximum
number of users allowed by the device exceeds the upper alarm threshold, the
device generates an alarm. When the percentage of online Portal authentication
users against the maximum number of users allowed by the device reaches or falls
below the lower alarm threshold later, the device generates a clear alarm.
If the configured upper alarm threshold for the Portal authentication user count
percentage is 100, the device generates an alarm when the number of online users
reaches the maximum number of users allowed by the device.
Example
# Set the lower alarm threshold for the Portal authentication user count
percentage to 30, and the upper alarm threshold for the Portal authentication
user count percentage to 80.
<HUAWEI> system-view
[HUAWEI] portal user-alarm percentage 30 80
Related Topics
13.5.126 portal max-user
Format
portal web-authen-server { http | https ssl-policy policy-name } [ port port-
number ]
undo portal web-authen-server [ port ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If the device is connected to the Portal server that only supports the HTTP or
HTTPS protocol, you need to run the portal web-authen-server command on the
device to enable the Portal interconnection function of the HTTP or HTTPS
protocol.
Follow-up Procedure
Run the 13.4.172 protocol (Portal server template view) command to set the
protocol used in Portal authentication to HTTP or HTTPS.
Precautions
Modifying the port parameter causes the pre-connected user to go offline.
Example
# Enable the Portal interconnection function of the HTTPS protocol.
<HUAWEI> system-view
[HUAWEI] ssl policy huawei
[HUAWEI-ssl-policy-huawei] quit
[HUAWEI] portal web-authen-server https ssl-policy huawei port 8443
Related Topics
13.4.89 display web-auth-server configuration
Format
protocol { http [ password-encrypt { none | uam } ] | portal }
undo protocol
Parameters
Parameter Description Value
Views
Portal server template view
Default Level
2: Configuration level
Usage Guidelines
In Portal authentication, the device can use the following protocols to
communicate with the Portal server. You can set the protocol according to the
protocol supported by the Portal server.
● Portal protocol
● HTTP or HTTPS protocol
Example
# Set the protocol used in Portal authentication to HTTP or HTTPS.
<HUAWEI> system-view
[HUAWEI] web-auth-server abc
[HUAWEI-web-auth-server-abc] protocol http password-encrypt uam
13.5.135 remark
Function
The remark command configures the user group priority.
The undo remark command cancels the user group priority configuration.
NOTE
Only the S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
remark { 8021p 8021p-value | dscp dscp-value } *
Parameters
Parameter Description Value
Views
User group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the user group priority is configured, users in the user group inherit the
priority. That is, different user packets have different priorities. In this way, the
administrator can manage different types of users more flexibly.
Precautions
When the remark and 5.7.8 voice-vlan remark commands are used together to
modify the user packet priority, if the services conflict:
● For S5720HI, the priority configured using the remark command takes effect.
● For S5720EI, S6720EI, and S6720S-EI, the priority configured using the 5.7.8
voice-vlan remark command takes effect.
Example
# Set the priority for processing IP packets to 3 in the user group abc.
<HUAWEI> system-view
[HUAWEI] user-group abc
[HUAWEI-user-group-abc] remark dscp 3
Related Topics
13.5.157 user-group enable
13.5.156 user-group
Function
The reset aaa statistics access-type-authenreq command clears the number of
requesting for MAC, Portal, or 802.1X authentication.
Format
reset aaa statistics access-type-authenreq
Parameters
None
Views
All views
Default Level
3: Management level
Usage Guidelines
When users send authentication requests, the device collects statistics on the
number of initiating MAC, Portal, and 802.1X authentications.
To clear the number of requesting for MAC, Portal, or 802.1X authentication, run
the reset aaa statistics access-type-authenreq command.
Example
# Clear the number of requesting for MAC, Portal, or 802.1X authentication.
<HUAWEI> reset aaa statistics access-type-authenreq
NOTE
Only the S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
reset access-user traffic-statistics { user-id begin-id [ end-id ] | mac-address
mac-address | ip-address ip-address [ vpn-instance vpn-instance ] }
Parameters
Parameter Description Value
user-id begin-id Specifies IDs of online users. The value is an integer
[ end-id ] that varies depending on
● begin-id specifies the start ID the product model.
of online users.
● end-id specifies the end ID of
online users. The value of end-
id must be equal to or greater
than that of begin-id.
To view IDs of online users, run
the 13.5.31 display access-user
command.
Views
User view
Default Level
3: Management level
Usage Guidelines
After traffic control is configured for users in a user group using the 13.5.27 car
(user group view) command, the device collects statistics on traffic of each user
in the user group. You can run the reset access-user traffic-statistics command
to clear statistics on traffic of online users in a user group.
NOTE
After you run the reset access-user traffic-statistics command to clear traffic statistics, the
cleared user traffic statistics are not included in the accounting packets sent by the device
to the accounting server.
Example
# Clear statistics on traffic of the user with the IP address as 10.1.1.1.
<HUAWEI> reset access-user traffic-statistics ip-address 10.1.1.1
Related Topics
13.5.27 car (user group view)
Format
reset dot1x statistics [ interface { interface-type interface-number1 [ to
interface-number2 ] } &<1-10> ]
Parameters
Parameter Description Value
Views
User view
Default Level
3: Management level
Usage Guidelines
The 802.1X authentication statistics contain the number of times that the
authentication succeeded and failed on an interface and the number of sent and
received packets.
● Redeploy services. After the statistics are cleared, collect the 802.1X
authentication statistics again, and run the 13.5.34 display dot1x command
to check whether the authentication function works properly and whether
packets are correctly sent and received.
● Rectify a fault. After the fault is rectified, run the reset dot1x statistics
command to clear the statistics, collect the statistics on 802.1X authentication
again, and then run the 13.5.34 display dot1x command to verify the
authentication result and check whether packets are correctly sent and
received. If the authentication is successful and packets are correctly sent and
received, the fault is rectified.
Example
# Clear 802.1X authentication statistics on GE0/0/1.
<HUAWEI> reset dot1x statistics interface gigabitethernet 0/0/1
Related Topics
13.5.34 display dot1x
Function
The reset mac-authen statistics command clears MAC address authentication
statistics.
Format
reset mac-authen statistics [ interface { interface-type interface-number1 [ to
interface-number2 ] } &<1-10> ]
Parameters
Parameter Description Value
Views
User view
Default Level
3: Management level
Usage Guidelines
The reset mac-authen statistics command is used in the following scenarios:
● Re-deploy services. After the statistics are cleared, collect the MAC address
authentication statistics again, and run the 13.5.38 display mac-authen
command to check whether the authentication function is normal.
● Rectify a fault. After the fault is rectified, run the reset mac-authen statistics
command to clear statistics, collect MAC address authentication statistics
again, and run the 13.5.38 display mac-authen command to check the
authentication result. If the authentication is successful, the fault is rectified.
Example
# Clear MAC address authentication statistics on GE0/0/1.
<HUAWEI> reset mac-authen statistics interface gigabitethernet 0/0/1
Related Topics
13.5.38 display mac-authen
13.5.140 server-detect
Function
The server-detect command enables the Portal server detection function.
The undo server-detect command disables the Portal server detection function.
By default, the Portal server detection function is disabled.
Format
server-detect [ interval interval-period | max-times times | critical-num critical-
num | action { log | trap | permit-all } * ] *
undo server-detect [ interval | max-times | critical-num | action { log | trap |
permit-all } * ]
Parameters
Parameter Description Value
Views
Portal server template view
Default Level
2: Configuration level
Usage Guidelines
If the communication is interrupted because the network between the device and
Portal server is faulty or the Portal server is faulty, new Portal authentication users
cannot go online. This brings great inconvenience to users.
After the Portal server detection function is enabled in the Portal server template,
the device detects all Portal servers configured in the Portal server template. If the
number of times that the device fails to detect a Portal server exceeds the upper
limit, the status of the Portal server is changed from Up to Down. If the number of
Portal servers in Up state is less than or equal to the minimum number (specified
by the critical-num parameter), the device performs the corresponding operation
to allow the administrator to obtain the real-time Portal server status or ensure
that the users have certain network access rights.
NOTE
The detection interval of the Portal server multiplied by the maximum number of detection
failures cannot be less than the keepalive heartbeat interval of the Portal server. It is
recommended that the configured detection interval of the Portal server be greater than
the keepalive heartbeat interval of the Portal server.
Example
# Enable the Portal server detection function in the Portal server template abc.
Configure the detection interval to 100 seconds, the maximum number of
detection failures to 5. Configure the device to send log information when the
number of detection failures exceeds the upper limit.
<HUAWEI> system-view
[HUAWEI] web-auth-server abc
[HUAWEI-web-auth-server-abc] server-detect interval 100 max-times 5 action log
Related Topics
13.5.158 user-sync
Format
server-ip server-ip-address &<1-10>
Parameters
Parameter Description Value
server-ip-address Specifies an IP address of a Portal The value is in dotted
server. decimal notation.
all Deletes all IP addresses of a Portal -
server.
Views
Portal server template view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After creating a Portal server template on the device using the 13.5.167 web-
auth-server (system view) command, configure parameters for the template.
Run the server-ip command to configure an IP address for the Portal server in the
Portal server template view. When receiving a Portal authentication request packet
from a user, the device sends a response packet to the Portal server with the
configured IP address.
Precautions
Example
# Set the Portal server IP address in the Portal server template huawei to
10.10.10.1.
<HUAWEI> system-view
[HUAWEI] web-auth-server huawei
[HUAWEI-web-auth-server-huawei] server-ip 10.10.10.1
Related Topics
13.5.56 display web-auth-server configuration
13.5.167 web-auth-server (system view)
13.5.150 url (Portal server template view)
Format
shared-key cipher key-string
undo shared-key
Parameters
Parameter Description Value
cipher Displays a shared key in -
cipher text.
Views
Portal server template view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a shared key is configured using the shared-key command, the Portal packet
exchanged between the device and Portal server carries an authenticator
generated according to the shared key, and the authenticator is used to check
whether the Portal packet at the receiver is correct. This effectively improves the
information exchange security.
Precautions
To improve security, it is recommended that the password contains at least two
types of lower-case letters, upper-case letters, numerals, and special characters,
and contains at least 6 characters.
Example
# Configure the shared key in the Portal server template huawei to huawei@123.
<HUAWEI> system-view
[HUAWEI] web-auth-server huawei
[HUAWEI-web-auth-server-huawei] shared-key cipher huawei@123
Related Topics
13.5.56 display web-auth-server configuration
13.5.167 web-auth-server (system view)
Format
snmp-agent trap enable feature-name mid_aaa [ trap-name
{ hwmacmovedquietmaxuseralarm | hwmacmovedquietuserclearalarm } ]
undo snmp-agent trap enable feature-name mid_aaa[ trap-name
{ hwmacmovedquietmaxuseralarm | hwmacmovedquietuserclearalarm } ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After the trap function is enabled, the device generates traps during operation and
sends the traps to the NMS through the SNMP module. If the trap function is
disabled, the device does not generate traps and the SNMP module does not send
traps to the NMS.
You can specify trap-name to enable the trap function for one or more events.
Example
# Enable the trap function for hwmacmovedquietmaxuseralarm of the AAA
module.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name mid_aaa trap-name
hwmacmovedquietmaxuseralarm
Related Topics
13.5.50 display snmp-agent trap feature-name mid_aaa all
Format
snmp-agent trap enable feature-name mid_eapol [ trap-name
{ hwmacauthenmaxuseralarm | hwsrvcfgeapmaxuseralarm } ]
undo snmp-agent trap enable feature-name mid_eapol [ trap-name
{ hwmacauthenmaxuseralarm | hwsrvcfgeapmaxuseralarm } ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After the trap function is enabled, the device generates traps during operation and
sends the traps to the NMS through the SNMP module. If the trap function is
disabled, the device does not generate traps and the SNMP module does not send
traps to the NMS.
You can specify trap-name to enable the trap function for one or more events.
Example
# Enable the trap function for hwmacauthenmaxuseralarm of the DOT1X module.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name mid_eapol trap-name hwmacauthenmaxuseralarm
Related Topics
13.5.51 display snmp-agent trap feature-name mid_eapol all
Function
The snmp-agent trap enable feature-name mid_web command enables the trap
function for the web authentication module.
By default, the trap function is enabled for the web authentication module.
Format
snmp-agent trap enable feature-name mid_web [ trap-name
{ hwportalmaxuseralarm | hwportaluserclearalarm | hwportalserverdown |
hwportalserverup } ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After the trap function is enabled, the device generates traps during operation and
sends the traps to the NMS through the SNMP module. If the trap function is
disabled, the device does not generate traps and the SNMP module does not send
traps to the NMS.
You can specify trap-name to enable the trap function for one or more events.
Example
# Enable the trap function for hwportalmaxuseralarm of the web authentication
module.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name mid_web trap-name hwportalmaxuseralarm
Related Topics
13.5.52 display snmp-agent trap feature-name mid_web all
Format
source-ip ip-address
undo source-ip
Parameters
Parameter Description Value
ip-address Specifies the source IP address for The value is in dotted
communication with a Portal server. decimal notation.
Views
Portal server template view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To ensure normal communication between the device and Portal server, run the
source-ip command to configure a source IP address on the device.
Example
# Set the source IP address for communication between the device and a Portal
server to 192.168.1.100 in the Portal server template huawei.
<HUAWEI> system-view
[HUAWEI] web-auth-server huawei
[HUAWEI-web-auth-server-huawei] source-ip 192.168.1.100
Related Topics
13.5.167 web-auth-server (system view)
13.5.147 static-user
Function
The static-user command configures a static user.
The undo static-user command deletes the configured static user.
By default, no static user is configured.
Format
static-user start-ip-address [ end-ip-address ] [ vpn-instance vpn-instance-
name ] [ domain-name domain-name | interface interface-type interface-
number [ detect ] | mac-address mac-address | vlan vlan-id ] *
undo static-user start-ip-address [ end-ip-address ] [ vpn-instance vpn-instance-
name ]
NOTE
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In network deployment, static IP addresses are assigned to dumb terminals such
as printers and servers. The users can be configured as static users for flexible
authentication.
After static users are configured, the device can use static user information such as
their IP addresses as the user names to authenticate the users only when Portal
authentication is enabled on the interfaces connected to the static users.
Precautions
When the interface (interface interface-type interface-number) mapping static
users is specified, the VLAN (vlan vlan-id) that the interface belongs to must be
configured.
This function takes effect only for users who go online after this function is
successfully configured.
Static users are not allowed to update the IP address, otherwise the users will go
offline.
Example
# Specify the IP address range 10.1.1.1-10.1.1.10, authentication domain huawei,
and VLAN 10 that static users belong to.
<HUAWEI> system-view
[HUAWEI] static-user 10.1.1.1 10.1.1.10 domain-name huawei vlan 10
Related Topics
13.5.149 static-user username format-include
13.5.148 static-user password
13.5.53 display static-user
Format
static-user password cipher password
undo static-user password
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a static user triggers authentication through an ARP packet, you can run
the static-user password command to set the password for the static user. The
access device then sends the password to the authentication server.
Precautions
To improve security, change the default password immediately and update the
password periodically. It is recommended that the new password contains at least
two types of lower-case letters, upper-case letters, numerals, and special
characters, and contains at least 6 characters.
This function takes effect only for users who go online after this function is
successfully configured.
Example
# Configure the password huawei@123 for static users.
<HUAWEI> system-view
[HUAWEI] static-user password cipher huawei@123
Related Topics
13.5.147 static-user
13.5.149 static-user username format-include
13.5.53 display static-user
Format
static-user username format-include { ip-address | mac-address | system-
name }
undo static-user username format-include
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When a static user triggers authentication through an ARP packet, you can run
the static-user username format-include command to set the user name for the
static user. The access device then sends the user name to the authentication
server.
Example
# Set the user IP address as the static user name for authentication.
<HUAWEI> system-view
[HUAWEI] static-user username format-include ip-address
Related Topics
13.5.147 static-user
13.5.148 static-user password
13.5.53 display static-user
Function
The url command configures the URL for a Portal server.
Format
url url-string
undo url
Parameters
Views
Portal server template view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the Portal server IP address is configured using the 13.5.141 server-ip
(Portal server template view) command, the Portal server URL is generated by
default on the device. If the existing Portal server URL is inconsistent with the
default one or the domain name needs to be used, you need to run the url
command to specify the Portal server URL.
Precautions
Example
# Set the URL of a Portal server to http://www.***.com in the Portal server
template huawei.
<HUAWEI> system-view
[HUAWEI] web-auth-server huawei
[HUAWEI-web-auth-server-huawei] url http://www.***.com
Related Topics
13.5.56 display web-auth-server configuration
13.5.167 web-auth-server (system view)
13.5.141 server-ip (Portal server template view)
Function
The url command configures the redirection URL or pushed URL.
The undo url command cancels the redirection URL or pushed URL.
Format
url [ push-only | redirect-only ] url-string
Parameters
Parameter Description Value
Views
URL template view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a URL template is created using the 13.5.155 url-template name command,
you can run this command to configure the redirection URL or pushed URL. When
a user without network access right connects to the network, the Portal
authentication device redirects the user to the specified URL for
authentication.The difference between redirection URL and pushed URL is as
follows:
● Redirection URL: When a user without network access right connects to the
network, the Portal authentication device redirects the user to the redirection
URL for authentication.
● Pushed URL: After an authenticated user accesses the network through web
for the first time, the access device pushes the web page corresponding to the
URL to the user. The web access request from the user is redirected to the
specified URL, and then the user is allowed to access network resources.
Precautions
When configuring a URL on the device, you cannot enter a question mark (?). If a
URL contains a question mark (?), you can run the parameter start-mark #
command in the URL template view to replace the question mark (?) with the
number sign (#).
If the push-only and redirect-only parameters are not specified, the configured
URL is used as both redirection URL and pushed URL. You can configure pushed
URL using the 13.5.85 force-push command, or use the 13.5.154 url-template
(Portal server template view) command to bind a URL template to the Portal
server template to configure redirection URL.
Example
# Set the redirection URL to http://10.1.1.1.
<HUAWEI> system-view
[HUAWEI] url-template name huawei
[HUAWEI-url-template-huawei] url http://10.1.1.1
13.5.152 url-parameter
Function
The url-parameter command sets the parameters in URL.
The undo url-parameter command deletes the parameters in URL.
By default, a URL does not carry parameters.
Format
url-parameter { redirect-url redirect-url-value | sysname sysname-value | user-
ipaddress user-ipaddress-value | user-mac user-mac-value | login-url url-key url }
*
undo url-parameter
Parameters
Parameter Description Value
redirect-url Specifies the original URL that a user The value is a string
redirect-url- accesses carried in the URL and sets the of 1 to 16 case-
value parameter name. sensitive characters
without spaces.
user-mac Specifies the user MAC address carried in The value is a string
user-mac- the URL and sets the parameter name. of 1 to 16 case-
value sensitive characters
without spaces.
login-url url- Specifies the login URL of the access ● url-key: The
key url device. value is a string
● url-key: specifies the identification of 1 to 16 case-
keyword for the login URL sent to the sensitive
Portal server during redirection. characters
without spaces,
● url: is a specified URL on the access question marks
device. (?), ampersands
(&), and equal
signs (=).
● url: The value is a
string of 1 to 200
case-sensitive
characters
without spaces.
Views
URL template view
Default Level
2: Configuration level
Usage Guidelines
After a URL template is created using the 13.5.155 url-template name command
and URL is configured using the 13.5.151 url (URL template view) command,
you can use the url-parameter command to set the parameters in the URL. When
a user accesses the Portal server according to the URL, the Portal server obtains
user terminal information through the parameters in the URL. The Portal server
then provides the corresponding web authentication page for the user according
to user terminal information.
In addition, when users are pushed to a website rather than the Portal server
according to the URL, the website provides the different web pages for the users
according to user terminal information carried in the URL.
Example
# Set the user MAC address and access device system name in the URL.
<HUAWEI> system-view
[HUAWEI] url-template name huawei
[HUAWEI-url-template-huawei] url-parameter user-mac usermac sysname huawei
Format
url-parameter mac-address format delimiter delimiter { normal | compact }
undo url-parameter mac-address format
Parameters
Parameter Description Value
Views
URL template view
Default Level
2: Configuration level
Usage Guidelines
Portal servers or websites may require different MAC address formats. You can run
the url-parameter mac-address format command to set MAC address formats in
URL to meet the requirements of Portal servers.
Example
# Set the delimiter to - and format to XXXX-XXXX-XXXX.
<HUAWEI> system-view
[HUAWEI] url-template name huawei
[HUAWEI-url-template-huawei] url-parameter mac-address format delimiter - compact
Function
The url-template command binds a URL template to a Portal server template.
The undo url-template command unbinds a URL template from a Portal server
template.
Format
url-template url-template [ ciphered-parameter-name ciphered-parameter-
name iv-parameter-name iv-parameter-name key cipher key-string ]
undo url-template
Parameters
Parameter Description Value
Views
Portal server template view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the parameters of a URL template are configured, the URL template must be
bound to a Portal authentication server template so that users can be
authenticated on the Portal authentication server corresponding to the redirection
URL.
To ensure security, you can encrypt the parameter information in the URL
template bound to the Portal server profile.
Prerequisites
A URL template has been created using the 13.5.155 url-template name
command.
Precautions
If a URL template is bound to the Portal authentication server template and the
13.5.150 url (Portal server template view) command is executed to configure
the redirection URL corresponding to the Portal authentication server, only the
parameters in the URL template take effect.
The device support encryption of parameter information in the URL template only
when it connects to the Huawei Agile Controller-Campus.
Example
# Bind the URL template abc to the Portal authentication server template.
<HUAWEI> system-view
[HUAWEI] url-template name abc
[HUAWEI-url-template-abc] quit
[HUAWEI] web-auth-server huawei
[HUAWEI-web-auth-server-huawei] url-template abc
Related Topics
13.5.151 url (URL template view)
13.5.155 url-template name
Format
url-template name template-name
undo url-template name template-name
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After a Portal authentication server template is created using the 13.5.167 web-
auth-server (system view) command, you can bind a URL template to the Portal
authentication server template. The URL template contains the redirection URL
and redirection URL parameters.
Example
# Create a URL template named huawei and enter the template view.
<HUAWEI> system-view
[HUAWEI] url-template name huawei
13.5.156 user-group
Function
The user-group command creates a user group or displays the user group view.
Format
user-group group-name
Parameters
Parameter Description Value
group-name Specifies the name The value is a string of 1-64 case-sensitive
of a user group. characters, which cannot be configured to -
and --. It cannot contain spaces and the
following symbols: / \ : * ? " < > | @ ' %.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In practical NAC applications, there are many access users and a large number of
ACL rules need to be configured for each user. However, the number of user types
is limited.
You can run the user-group command to create user groups on the device and
associate each user group to a group of ACL rules (for details, see 13.5.6 acl-id
(user group view)). In this way, users in the same group share a group of ACL
rules. The limited ACL resources can support a large number of access users.
NOTE
When the user group function is enabled on models except the S5720EI, S5720HI, S6720EI,
and S6720S-EI, ACL rules are delivered to each user and the user group function cannot be
used to save ACL resources.
Precautions
● When you create a user group, ensure that the user group name is different
from the number of an existing ACL. You can run the display acl all
command to view the configuration of all ACL rules on the device.
● If you want to delete the user group when the ACL bound to the user takes
effect, run the cut access-user user-group group-name command to
disconnect all users bound to the user group, and run the undo user-group
group-name enable command to disable the user group function.
● The priority of the user group authorization information delivered by the
authentication server is higher than that of the user group authorization
information applied in the AAA domain. If the user group authorization
information delivered by the authentication server cannot take effect, the user
group authorization information applied in the AAA domain is used. For
example, if only user group B is configured on the device and the group
authorization information is applied in the AAA domain when the
authentication server delivers authorization information about user group A,
the authorization information about user group A cannot take effect and the
authorization information about user group B is used. To make the user group
Example
# Create a user group test1.
<HUAWEI> system-view
[HUAWEI] user-group test1
Related Topics
13.5.6 acl-id (user group view)
13.5.157 user-group enable
Format
user-group group-name enable
undo user-group group-name enable
Parameters
Parameter Description Value
group-name Specifies the name of a The value is a string of 1 to 64 case-
user group. sensitive characters without spaces.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If a user group has been created using the 13.5.156 user-group command, run
the user-group enable command to enable the user group function.
Precautions
After the user group function is enabled, the binding relationship between a user
group and an ACL cannot be modified.
If the user group function is not enabled, users going online through Layer 2
interfaces can access the network without restriction, while users going online
through VLANIF interfaces are not allowed to access the network.
Example
# Enable the user group huawei.
<HUAWEI> system-view
[HUAWEI] user-group huawei enable
13.5.158 user-sync
Function
The user-sync command enables user information synchronization.
The undo user-sync command disables user information synchronization.
By default, user information synchronization is disabled.
Format
user-sync [ interval interval-period | max-times times ] *
undo user-sync
Parameters
Parameter Description Value
interval interval- The value is an integer that
Specifies the user
period ranges from 30 to 65535, in
information synchronization
seconds. The default value is
interval.
300.
max-times times Specifies the maximum The value is an integer that
number of user information ranges from 2 to 255. The
synchronization failures. default value is 3.
Views
Portal server template view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
NOTE
During information synchronization, the device does not disconnect the user immediately
after detecting that the device has certain user information while the server does not have
such information. Instead, the device disconnects the user when the maximum number of
user information synchronization failures is reached.
Precautions
If users go online during the keepalive interval of the Portal server, the Portal
server does not have their entries. After the Portal server goes Up and starts
synchronizing user information, the device does not disconnect these users even if
synchronization fails. The device retails these users until next time these users go
online and performs Portal authentication, ensuring good user experience.
When you run the user-sync command, make sure that the Portal server supports
this function. otherwise, the users will go offline.
Example
# Enable user information synchronization in the Portal server template abc, set
the interval for user information synchronization to 100s, and set the maximum
number of synchronization failures to 5.
<HUAWEI> system-view
[HUAWEI] web-auth-server abc
[HUAWEI-web-auth-server-abc] user-sync interval 100 max-times 5
Format
user-vlan vlan-id
undo user-vlan
Parameters
Parameter Description Value
Views
User group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a user group is created using the user-group command, you can run the
user-vlan command to configure a user group VLAN, so that users in different
user groups have different network access permissions. When a user in a user
group goes online, the user is added to the user group VLAN to obtain the
network access permission of this user group.
Prerequisites
The user group VLAN has been created using the vlan command.
Precautions
● An authorized VLAN cannot be delivered to online Portal users.
● If a user uses Portal authentication or combined authentication (including
Portal authentication), the device cannot authorize a VLAN to the user.
● The user-vlan command does not take effect for the users who are already
online.
● If the user access mode is not multi-share,to make the user-vlancommand
take effect, you must configure the link type of the interface connected to
users to hybrid . Access switches will send untagged frames to users in the
user-vlan even when interfaces connected users are added to this user VLAN
in tagged mode.
Example
# Set the VLAN of the user group abc to 10.
<HUAWEI> system-view
[HUAWEI] user-group abc
[HUAWEI-user-group-abc] user-vlan 10
Related Topics
13.5.157 user-group enable
13.5.156 user-group
Function
The vm-authen password command configures a password for virtual users
during RADIUS authentication.
The undo vm-authen password command restores the default password for
virtual users during RADIUS authentication.
The default username and password are available in S Series Switches Default
Usernames and Passwords (Enterprise Network or Carrier). If you have not
obtained the access permission of the document, see Help on the website to find
out how to obtain it.
NOTE
Format
vm-authen password cipher password
Parameters
Parameter Description Value
cipher Displays a password in cipher -
text.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run the vm-authen password command to configure a password for
virtual users during RADIUS authentication.
Precautions
Example
# Set the password huawei for virtual users during RADIUS authentication.
<HUAWEI> system-view
[HUAWEI] vm-authen password cipher huawei
Function
The vm-user association-type command configures the association type of a
virtual user.
NOTE
Format
vm-user association-type { online | pre-online | offline } mac-address mac-
address interface interface-type interface-number vlan vlan-id [ ip-address ip-
address | profile profile-name | vsi vsi-name ] *
Parameters
profile profile- Specifies the profile to which the The value is a string of 1
name virtual user belongs. to 64 case-sensitive
characters without spaces.
vsi vsi-name Specifies the name of the virtual The value is a string of 1
site interface. to 64 case-sensitive
characters without spaces.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In virtual network management, you must configure the function specified by the
vm-user association-type command on the network management system (NMS)
so that virtual users can access the network. The NMS then delivers the function
configuration to the device. After receiving the related function configuration, the
device automatically runs the vm-user association-type command to configure
the association type of the virtual user.
Precautions
Example
# Set the association type of the virtual user with the MAC address 1-1-1 in VLAN
10 on GE0/0/1 to pre-online.
<HUAWEI> system-view
[HUAWEI] vm-user association-type pre-online mac-address 1-1-1 interface gigabitethernet 0/0/1 vlan
10
NOTE
Format
vpn-instance vpn-instance-name
undo vpn-instance
Parameters
Parameter Description Value
Views
Portal server template view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A VPN implements interconnection within the same department and between
different departments in an enterprise. To enable the Portal authentication service
in the VPN, run the vpn-instance command to bind a Portal server template to a
VPN instance.
Prerequisites
Precautions
The VPN instance bound to the Portal server template must be the same as that
bound to the Portal server; otherwise, the device cannot perform Portal
authentication for access users.
The users in VPN instances bound to different Portal server templates cannot use
the same IP addresses because users with the same IP addresses cannot go online
or offline.
Example
# Bind the Portal server template abc to the VPN instance huawei.
<HUAWEI> system-view
[HUAWEI] web-auth-server abc
[HUAWEI-web-auth-server-abc] vpn-instance huawei
Related Topics
10.4.36 ip vpn-instance
Function
The web-auth-server version command sets the Portal protocol version
supported by the device.
By default, the device supports both the versions V1.0 and V2.0.
Format
web-auth-server version v2 [ v1 ]
Parameters
Parameter Description Value
v2 Indicates that the device supports the Portal protocol version -
V2.0. The major version currently used is V2.0.
v1 Indicates that the device supports the Portal protocol version -
V1.0.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Currently, the Portal protocol has two versions: V1.0 and V2.0. The device and
Portal server must use the Portal protocol of the same version to ensure normal
communication. You can run the web-auth-server version command to set the
Portal protocol version supported by the device.
NOTE
Example
# Configure the device to use only the Portal protocol V2.0.
<HUAWEI> system-view
[HUAWEI] web-auth-server version v2
Related Topics
13.5.56 display web-auth-server configuration
Function
The web-auth-server command binds a Portal server template to an interface.
Format
● VLANIF interface view:
web-auth-server server-name [ bak-server-name ] { direct | layer3 }
undo web-auth-server [ server-name [ bak-server-name ] ] { direct | layer3 }
● Layer 3 Ethernet interface view: (Only the S5720EI, S5720HI, S6720EI, and
S6720S-EI support this)
web-auth-server server-name [ bak-server-name ] layer3
undo web-auth-server [ server-name [ bak-server-name ] layer3 ]
Parameters
Views
VLANIF interface view, GE interface view, XGE interface view, 40GE interface view,
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A configured Portal server template must be bound to the interface. In this way,
the users connected to this interface can be authenticated by the Portal server.
When the Portal server template is bound to the interface using the web-auth-
server command and a user attempts to access charged network resources, the
user is forcibly redirected to the configured Portal authentication page for Portal
authentication.
After the primary and secondary Portal server templates are configured, the users
who send HTTP requests are redirected to the network access page provided by
the secondary Portal server when the primary Portal server is faulty or cannot be
accessed. This meets the users' network access requirements. This function can
take effect only when the primary Portal server detection function is enabled
using the 13.5.140 server-detect command and heartbeat detection is enabled on
the Portal server.
● layer3: Whether Layer 3 forwarding devices exist between the user and
device, the device cannot learn the user's MAC address. The device identifies
the user using the IP address uniquely.
Prerequisites
A Portal server template has been created using the 13.5.167 web-auth-server
(system view) command and an IP address has been configured for the Portal
server using the 13.5.141 server-ip (Portal server template view) command.
Precautions
● You can bind only one Portal server template to an interface. To modify a
Portal server template that has been bound to an interface, remove the
template from the interface, modify the template, and bind the modified
template to the interface again.
● If 802.1X authentication, MAC address authentication, MAC address bypass
authentication or built-in Portal authentication is enabled on a Layer 2
interface, this command cannot be executed on the VLANIF interface of a
VLAN to which the Layer 2 interface is added.
● This command does not take effect on the VLANIF interface corresponding to
the super VLAN.
Example
# Bind the Portal server template Server1 to VLANIF10, and set the authentication
mode to Layer 2 authentication.
<HUAWEI> system-view
[HUAWEI] vlan batch 10
[HUAWEI] web-auth-server Server1
[HUAWEI-web-auth-server-Server1] server-ip 10.10.1.1
[HUAWEI-web-auth-server-Server1] quit
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] web-auth-server Server1 direct
Related Topics
13.5.167 web-auth-server (system view)
13.5.141 server-ip (Portal server template view)
13.5.56 display web-auth-server configuration
Format
web-auth-server listening-port port-number
Parameters
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When the device exchanges user authentication information with the Portal server
using the Portal protocol, you must configure the listening port on the device to
receive Portal packets.
You can run the web-auth-server listening-port command to set the number of
the port through which the device listens on Portal packets. The port number must
be the same as the destination port number in Portal packets sent by the Portal
server and must be unique.
NOTE
If a specified port is occupied by another service or is a reserved port, the configuration fails.
Ensure that the specified port is available when running this command.
Example
# Set the number of the port through which a device listens on Portal protocol
packets to 3000.
<HUAWEI> system-view
[HUAWEI] web-auth-server listening-port 3000
Related Topics
13.5.56 display web-auth-server configuration
Function
The web-auth-server reply-message command enables the device to
transparently transmit users' authentication responses sent by the authentication
server to the Portal server.
Format
web-auth-server reply-message
undo web-auth-server reply-message
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The AAA server requires that the authentication messages sent to the Portal server
contain the authentication reply; therefore, the web-auth-server reply-message
command is required. In certain situations, the authentication messages are not
required to carry the reply. In this case, run the undo web-auth-server reply-
message command.
By default, the device directly forwards the authentication result message from the
RADIUS server to the Portal server without processing. This is called transparent
transmission.
Example
# Disable the device from transparently transmitting users' authentication
responses to the Portal server.
<HUAWEI> system-view
[HUAWEI] undo web-auth-server reply-message
Related Topics
13.5.56 display web-auth-server configuration
Format
web-auth-server server-name
undo web-auth-server server-name
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When an unauthenticated Portal user goes online, the device forces the user to
log in to a specified website (also called the Portal website). The user can access
resources in the Portal website for free. When the user attempts to access charged
network resources, the user must pass authentication on the Portal website. The
specific process is as follows:
1. The unauthorized user opens Internet Explorer and enters a URL in the
address box. When receiving the HTTP request sent by the user, the device
redirects it to the Portal authentication page of the Portal server.
2. The user enters user information on the authentication page or in the
authentication dialog box, and the Portal server forwards the user information
to the device.
3. After receiving the user information from the Portal server, the device sends
the information to the authentication server for authentication and
accounting.
4. After the user is authenticated, the device allows the user to access the
Internet if no security policy is enforced.
After a Portal server template is created on the device by using the web-auth-
server command, run other commands to create a route from the device to the
Portal server.
Follow-up Procedure
Run the following commands to configure related attributes of the Portal server
template:
● Run the 13.5.141 server-ip (Portal server template view) command to
configure an IP address for the Portal server.
● Run the 13.5.150 url (Portal server template view) command to configure a
URL of the Portal server.
● Run the 13.5.104 port (Portal server template view) command to set the
port number that a Portal server uses to receive notification packets from the
device.
● Run the 13.5.142 shared-key (Portal server template view) command
configures the shared key that the device uses to exchange information with
the Portal server.
Precautions
You are advised to back up the Portal server data to prevent authentication failure
caused by the Portal server fault.
If you want to run the undo web-auth-server command to delete a Portal server
template, ensure that the Portal server template is not bound to the interface.
Example
# Create the Portal server template huawei.
<HUAWEI> system-view
[HUAWEI] web-auth-server huawei
Related Topics
13.5.56 display web-auth-server configuration
13.5.164 web-auth-server (interface view)
13.5.150 url (Portal server template view)
13.5.141 server-ip (Portal server template view)
13.5.104 port (Portal server template view)
13.5.142 shared-key (Portal server template view)
Format
web-redirection disable
undo web-redirection disable
Parameters
None
Views
Portal server template view
Default Level
2: Configuration level
Usage Guidelines
The device redirects all unauthenticated users to the Portal authentication page
when the users send access requests to external networks. For example, when the
user needs to enter the URL of the authentication page manually, the web-
redirection disable command can be executed so that unauthorized users are not
forcibly redirected to the Portal authentication page.
NOTE
If the Portal server template has been bound to the VLANIF interface, this command cannot
be executed.
After this command is executed, if multiple server IP addresses are configured in the Portal
server template and no URL is configured, the device does not display error information
when the Portal server template is bound to the VLANIF interface.
Example
# Disable the Portal authentication redirection function.
<HUAWEI> system-view
[HUAWEI] web-auth-server nac
[HUAWEI-web-auth-server-nac] web-redirection disable
Related Topics
13.5.56 display web-auth-server configuration
Function
The as access controller ip-address command specifies an IP address for a
control device on an access device.
Format
as access controller ip-address ip-address
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
When the policy association solution is deployed, access and control devices
establish connections through CAPWAP tunnels. When an access device
dynamically obtains an IP address through the DHCP server, Option 43 is used to
notify the access device of the IP address for the control device with which the
access device establishes a CAPWAP tunnel. When an IP address is statically
configured for an access device, the as access controller ip-address ip-address
command is used to specify the IP address for the control device with which the
access device establishes a CAPWAP tunnel.
Precautions
Example
# Specify an IP address for a control device.
<HUAWEI> system-view
[HUAWEI] as access controller ip-address 10.1.1.1
The undo as access interface command deletes the source interface specified for
establishing CAPWAP tunnels from an access device.
By default, no source interface is specified for establishing CAPWAP tunnels on an
access device.
Format
as access interface vlanif vlan-id
undo as access interface
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
When the policy association solution is deployed, CAPWAP tunnels are used for
connection establishment, user association, message communication, user
authorization policy delivery, and user synchronization between control and access
devices. On an access device, run the as access interface vlanif vlan-id command
to specify a source interface for establishing CAPWAP tunnels.
Precautions
This command is supported only on access devices.
The management VLAN of the CAPWAP tunnel cannot be the same as the
management VLAN of the cloud switch.
In policy association, the management VLAN of a CAPWAP tunnel connects access
devices to the network. It is not recommended to perform other service
configurations except basic configurations in the management VLAN and the
corresponding VLANIF interface. If such configurations are performed, access
devices may fail to connect to the network.
Example
# Specify a source interface for establishing CAPWAP tunnels.
<HUAWEI> system-view
[HUAWEI] vlan batch 10
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] quit
[HUAWEI] as access interface vlanif 10
Format
authentication access-point [ open ]
undo authentication access-point [ open ]
Parameters
Parameter Description Value
Views
Ethernet interface view, MultiGE interface view, 40GE interface view, GE interface
view, XGE interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When you deploy policy association, configure the interface of each access device
as the access point and enable remote access control on the interface.
To configure right control on a control device instead of an access device, you can
disable right control of the access point on the access device (by specifying the
open parameter).
Precautions
This command is supported only on access devices.
NOTE
When you run the authentication access-point and undo authentication access-point
commands, ensure that no authentication type is enabled on the interface. Otherwise,
disable the authentication type before you run the commands.
The authentication access-point open and authentication access-point command must
be run together; otherwise, the authentication access-point open command cannot take
effect.
The interface types vary according to device models.
If there is a terminal with one MAC address and multiple IP addresses on the live network,
you need to configure the function of identifying static users through IP addresses on the
control device. However, because the access device cannot generate multiple entries for the
terminal, you cannot implement right control on the access device. In this case, you need to
disable right control of the access point on the access device. Otherwise, packets of the
terminal will not be forwarded.
Example
# Configure GE0/0/1 as the access point.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] authentication access-point
Related Topics
13.6.8 authentication control-point
By default, an access device does not limit the maximum number of users who are
allowed to log in through its interfaces.
Format
authentication access-point max-user max-user-number
Parameters
Parameter Description Value
Views
Ethernet interface view, MultiGE interface view, 40GE interface view, GE interface
view, XGE interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To limit the maximum number of access users allowed on an interface of an
access device, run the authentication access-point max-user command.
Precautions
This command is supported only on access devices.
This command takes effect only for users who attempt to log in for the first time.
The interface types vary according to device models.
Example
# Set the maximum number of access users allowed on GE 0/0/1 to 100.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] authentication access-point max-user 100
Related Topics
13.6.8 authentication control-point
Format
authentication associate alarm-restrain enable
undo authentication associate alarm-restrain enable
Parameters
None
Views
System view
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
Precautions
Example
# Enable an access device to suppress alarms that are generated due to excess
associated users.
<HUAWEI> system-view
[HUAWEI] authentication associate alarm-restrain enable
Format
authentication associate alarm-restrain period period-value
Parameters
Parameter Description Value
Views
System view
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After an access device is enabled to suppress alarms that are generated due to
excess associated users using the authentication associate alarm-restrain
enable command, run the authentication associate alarm-restrain period
command to set a suppression period for these alarms. The device then does not
generate alarms of the same type within the suppression period.
Precautions
Example
# Set the suppression period to 600s for alarms that an access device generates
due to excess associated users.
<HUAWEI> system-view
[HUAWEI] authentication associate alarm-restrain period 600
Function
The authentication control-point command configures an interface as the
control point.
Format
authentication control-point [ open ]
Parameters
Parameter Description Value
Views
VLANIF interface view, Ethernet interface view, GE interface view, XGE interface
view, 40GE interface view, 100GE interface view, Eth-Trunk interface view, port
group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Precautions
Example
# Configure GE0/0/1 as the control point.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet0/0/1
[HUAWEI-GigabitEthernet0/0/1] authentication control-point
Related Topics
13.6.4 authentication access-point
Function
The authentication open ucl-policy enable command configures a control point
where the authentication control-point open command has been configured to
filter user traffic based on a user ACL before forwarding the traffic.
NOTE
Only the S5720HI, LE1D2S04SEC0 card, LE1D2X32SEC0 card, LE1D2H02QEC0 card, and X
series cards support this command.
Format
authentication open ucl-policy enable
Parameters
None
Views
GE interface view, XGE interface view, 40GE interface view, 100GE interface view,
Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A control point directly forwards traffic from wired users who go online on an
interface of the access device without authentication and the traffic from wireless
users in direct forwarding mode. To enable the control point to filter user traffic
based on a user ACL, run the authentication open ucl-policy enable command.
Prerequisites
The control device has been configured to filter packets based on a user ACL using
the traffic-filter inbound acl { acl-number | name acl-name } command.
Precautions
Example
# Configure the control point GE1/0/1 where the authentication control-point
open command has been configured to filter user traffic based on a user ACL
before forwarding the traffic.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet1/0/1
[HUAWEI-GigabitEthernet1/0/1] authentication control-point open
[HUAWEI-GigabitEthernet1/0/1] authentication open ucl-policy enable
Related Topics
13.6.8 authentication control-point
Function
The authentication speed-limit command configures the rate limit for an access
device to send user association and disassociation request messages.
The undo authentication speed-limit command restores the default rate limit for
an access device to send user association and disassociation request messages.
Format
authentication speed-limit max-num max-num-value interval interval-value
undo authentication speed-limit
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A control device can connect to multiple access devices. If the rate limit for an
access device to send user association and disassociation request messages is not
specified, there will be a heavy load on the control device. You can run this
command to adjust the rate limit.
Precautions
This command is supported only on access devices.
In an SVF system, commands cannot be configured on ASs. When the access rate
of users is high, they may fail to go online due to a rate limit. To lower the rate
limit, run the direct-command command on the UC device to deliver the
authentication speed-limit command configuration to the ASs. This requires that
the ASs run V200R013C00 or a later version.
Example
# Configure the access device to send a maximum of 100 association and
disassociation request messages within 10 seconds.
<HUAWEI> system-view
[HUAWEI] authentication speed-limit max-num 100 interval 10
Format
control-down offline delay { delay-value | unlimited }
undo control-down offline delay
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run the control-down offline delay command to configure the user
logout delay on an access device when a control tunnel is faulty. In this way, the
users will not directly go offline upon a tunnel fault. If the fault persists after the
delay, the users go offline; if the fault is rectified within the delay, the users keep
online.
Precautions
You are advised to configure the same user logout delay on control devices and
access devices.
Example
# Configure the user logout delay to 10 seconds on an access device after the
control tunnel is faulty.
<HUAWEI> system-view
[HUAWEI] control-down offline delay 10
Related Topics
13.6.12 control-down offline delay (control device)
Function
The control-down offline delay command configures the user logout delay on a
control device when a control tunnel is faulty.
The undo control-down offline delay command restores the default user logout
delay on a control device when a control tunnel is faulty.
Format
control-down offline delay { delay-value | unlimited }
Parameters
Parameter Description Value
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
100GE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run the control-down offline delay command to configure the user
logout delay on a control device when a control tunnel is faulty. In this way, the
users will not directly go offline upon a tunnel fault. If the fault persists after the
delay, the users go offline; if the fault is rectified within the delay, the users keep
online.
Precautions
You are advised to configure the same user logout delay on control devices and
access devices.
When you configure users not to go offline upon a channel tunnel failure, you also
need to configure link-down offline delay unlimited command in the
authentication profile view.
Example
# Configure the user logout delay to 10 seconds on GE0/0/1 of the control device
after a control tunnel is faulty.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet0/0/1
[HUAWEI-GigabitEthernet0/0/1] control-down offline delay 10
Related Topics
13.6.11 control-down offline delay (access device)
Function
The display access-user as-name command displays information about online
users on a specified access device.
Format
display access-user as-name as-name
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to check information about online access users on a
control device.
The actual name of an access device may differ from the name displayed on the
control device (using the display as all command). When an access device goes
online, its name is processed as follows:
● If the access device uses the default name, its name is changed to default
name-MAC address of the access device on the control device.
● If the access device name contains spaces or double quotation masks ("), the
spaces are changed to en dashes (-) and the double quotation masks (") are
changed to single quotation masks (') on the control device.
Example
# Display information about users on the access device test_as.
<HUAWEI> display access-user as-name test_as
------------------------------------------------------------------------------
UserID Username IP address MAC Status
------------------------------------------------------------------------------
16019 fdsa@none 192.168.6.5 00e0-4c88-143f Success
------------------------------------------------------------------------------
Total: 1, printed: 1
NOTE
Only letters, digits, and special characters can be displayed for username.
When the value of username contains special characters or characters in other languages
except English, the device displays dots (.) for these characters. If there are more than three
such consecutive characters, three dots (.) are displayed. Here, the special characters are the
ASCII codes smaller than 32 (space) or larger than 126 (~).
Format
display associate-user
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run this command to check associated users on access devices and control
devices.
Precautions
There are no longer associated users on control devices after the users are
successfully authenticated or added to domains. You can run the 13.1.34 display
access-user (All views) command to check user information.
Example
# Display the associated users on a control device.
<HUAWEI> display associate-user
------------------------------------------------------------------
UserID IP address MAC SA MAC
------------------------------------------------------------------
27 192.168.12.1 00e0-4c88-143f dcba-6543-e00a
------------------------------------------------------------------
Total: 1, printed: 1
Item Description
Format
display associate-user statistics [ interface interface-type interface-number ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
Precautions
Example
# Display statistics about associated users on an interface.
<HUAWEI> display associate-user statistics
-------------------------------------------------------------------------------
Interface number
-------------------------------------------------------------------------------
GigabitEthernet0/0/1 3
TotalNumber 3
-------------------------------------------------------------------------------
Total 1
Item Description
Item Description
Function
The display authentication associate command displays the global
configurations of associated users.
Format
display authentication associate
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
Precautions
Example
# Display the global configurations of associated users.
Format
display authentication associate alarm-restrain-table { all | interface interface-
type interface-number }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After an access device is enabled to suppress alarms that are generated due to
excess associated users using the authentication associate alarm-restrain
enable command, run the display authentication associate alarm-restrain-
table command to check the alarm suppression table information.
Precautions
Example
# Display alarm suppression table information on all interfaces.
<HUAWEI> display authentication associate alarm-restrain-table all
-------------------------------------------------------------------------------
Interface alarm time
-------------------------------------------------------------------------------
GigabitEthernet0/0/1 --
-------------------------------------------------------------------------------
Total 1
Item Description
Item Description
Format
display snmp-agent trap feature-name cfgmgr all
Parameters
None
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
After enabling the trap function for the cfgmgr module, you can run the display
snmp-agent trap feature-name cfgmgr all command to check the status of all
traps for the cfgmgr module. To enable the trap function for the cfgmgr module,
run the snmp-agent trap enable feature-name cfgmgr command.
Prerequisites
The SNMP function has been enabled on the device.
Example
# Display the status of all traps for the cfgmgr module.
<> display snmp-agent trap feature-name cfgmgr all
------------------------------------------------------------------------------
Feature name: cfgmgr
Trap number : 1
------------------------------------------------------------------------------
Trap name Default switch status Current switch status
hwAuthenAssociateAccessLimitTrap
on on
Item Description
13.6.19 local-authorize
Function
The local-authorize command specifies the user authorization information to be
delivered to a control device.
Format
local-authorize { none | { acl | car | priority | ucl-group | vlan } * }
undo local-authorize
Parameters
Parameter Description Value
Delivers ACL
acl authorization -
information.
Delivers CAR
car authorization -
information.
Delivers priority
priority authorization -
information.
Delivers VLAN
vlan authorization -
information.
Delivers no authorization
none -
information.
Views
Service scheme view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To enable a control device to implement specified user access policies, you can run
this command to specify user authorization information to be delivered to the
control device. By default, all authorization information is delivered to a control
device.
Precautions
This command takes effect for all user authorization types, such as local
authorization, remote authorization, and RADIUS dynamic authorization.
Example
# Deliver only UCL group authorization information to the control device.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] service-scheme huawei
[HUAWEI-aaa-service-huawei] local-authorize ucl-group
Related Topics
13.6.20 remote-authorize
13.6.20 remote-authorize
Function
The remote-authorize command specifies the user authorization information to
be delivered to an access device.
The undo remote-authorize command restores the default user authorization
information to be delivered to an access device.
By default, all user authorization information cannot be delivered to access
devices.
Format
remote-authorize { acl | car | ucl-group } *
undo remote-authorize
Parameters
Parameter Description Value
Delivers ACL
acl authorization -
information.
Delivers CAR
car authorization -
information.
Views
Service scheme view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To enable an access device to implement specified user access policies, you can
run this command to specify user authorization information to be delivered to the
access device. By default, no authorization information is delivered to the access
device.
Precautions
This command is supported only on access devices.
This command takes effect for all user authorization information, including local
authorization, remote authorization, and RADIUS dynamic authorization
information.
In SVF centralized configuration mode, access devices do not support ACL-based
authorization or UCL groups.
Example
# Deliver only ACL authorization information to the access device.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] service-scheme huawei
[HUAWEI-aaa-service-huawei] remote-authorize acl
Related Topics
13.6.19 local-authorize
Format
snmp-agent trap enable feature-name cfgmgr [ trap-name
hwauthenassociateaccesslimittrap ]
undo snmp-agent trap enable feature-name cfgmgr [ trap-name
hwauthenassociateaccesslimittrap ]
Parameters
Parameter Description Value
Views
Service scheme view
Default Level
3: Management level
Usage Guidelines
After the trap function is enabled, the device generates traps during operation and
sends the traps to the NMS through the SNMP module. If the trap function is
disabled, the device does not generate traps and the SNMP module does not send
traps to the NMS.
You can specify trap-name as required to enable the trap function for one or
more events.
Example
# Enable the hwauthenassociateaccesslimittrap trap function for the cfgmgr
module.
<> system-view
[] snmp-agent trap enable feature-name cfgmgr trap-name hwauthenassociateaccesslimittrap
13.6.22 user-detect
Function
The user-detect command enables the online user detection function on an
access device.
The undo user-detect command disables the online user detection function on an
access device.
By default, the online user detection function is enabled on an access device, the
detection interval is 15 seconds, and the number of packet retransmission
attempts is 3.
Format
user-detect { interval interval-value | retry retry-value } *
undo user-detect
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If a user goes offline due to a power failure or network interruption, the access
device and control device may still store information about this user, which results
in a heavy load on the control device. In addition, a limited number of users can
access the device. If a user goes offline unexpectedly but the device still stores
information of this user, other users cannot access the network.
After the detection interval is set, the device considers a user to be offline if the
user does not respond within the interval. Then the access device and control
device delete the saved information about the user, ensuring effective resource
usage.
Precautions
This command is supported only on access devices.
You are advised to keep this function enabled on access devices.
This function takes effect only for users who go online after it is configured.
Example
# Enable online user detection in the system view, and set the detection interval
to 10 seconds and number of packet retransmission attempts to 5.
<HUAWEI> system-view
[HUAWEI] user-detect interval 10 retry 5
Format
user-sync interval interval-value
undo user-sync
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the user synchronization interval is reached, the access device sends a
synchronization message containing MAC addresses of all online users to the
control device. After receiving the synchronization message, the control device
responds with a synchronization failure message if it finds that some users are
offline. The access device forcibly disconnects the corresponding users according to
the synchronization failure message.
Precautions
The user synchronization function needs to be enabled on both access devices and
control devices to ensure that the function works properly. In addition, the user
synchronization interval configured on access devices must be shorter than or
equal to that configured on control devices, preventing users from being
disconnected due to incorrect synchronization.
Example
# Set the user synchronization interval to 100 seconds.
<HUAWEI> system-view
[HUAWEI] user-sync interval 100
Related Topics
13.6.24 user-sync (control device)
Function
The user-sync command enables the user synchronization function on a control
device.
Format
user-sync { interval interval-value | retry retry-value } *
undo user-sync
Parameters
Parameter Description Value
Views
VLANIF interface view, Ethernet interface view, GE interface view, XGE interface
view, 40GE interface view, 100GE interface view, Eth-Trunk interface view, port
group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Example
# Set the user synchronization interval to 100 seconds and maximum number of
synchronization attempts to 15 on GE0/0/1 of the control device.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet0/0/1
[HUAWEI-GigabitEthernet0/0/1] user-sync interval 100 retry 15
Related Topics
13.6.23 user-sync (access device)