3Com Switch 8800 Configuration Guide Chapter 39 802.1x Configuration
39-6
auto (automatic identification mode, which is also called protocol control mode). That is,
the initial state of the port is unauthorized. It only permits EAPoL packets
receiving/transmitting and does not permit the user to access the network resources. If
the authentication flow is passed, the port will be switched to the authorized state and
permit the user to access the network resources.
The authorized-force keyword specifies the port to operate in authorized-force mode.
Ports in this mode are always authorized. Users can access a network through this kind
of port without being authorized.
The unauthorized-force keyword specifies the port to operate in unauthorized-force
mode. Ports in this mode are always unauthorized. They do not respond to
authorization requests. Users cannot access a network through this kind of port.
By default, the mode of 802.1x performing access control on the port is auto (automatic
identification mode).
39.2.3 Setting Port Access Control Method
The following commands are used for setting 802.1x access control method on the
specified port. When no port is specified in system view, the access control method of
all ports is configured.
Perform the following configuration in system view or Ethernet port view.
Table 39-3 Set port access control method
Operation Command
Set port access control method dot1x port-method { macbased |
portbased } [ interface interface-list ]
Restore the default port access
control method
undo dot1x port-method [ interface
interface-list ]
The macbased keyword specifies to authenticate each user accessing through the
port. And disconnection of a user does not affect other users. Whereas if you specify
the portbased keyword, users can access a network without being authenticated if a
user passes the authentication previously. But these users are denied when the one
who passes the authentication first goes offline.
By default, 802.1x authentication method on the port is macbased. That is,
authentication is performed based on MAC addresses.