05-Security Command
05-Security Command
Content
Table of Content
Chapter 1 AAA Command................................................................................................................................................. 1
1.1 AAA Authentication............................................................................................................................................. 1
1.1.1 aaa authentication enable default ............................................................................................................. 1
1.1.2 aaa authentication login ............................................................................................................................ 3
1.1.3 aaa authentication password-prompt ........................................................................................................ 4
1.1.4 aaa authentication username-prompt........................................................................................................ 5
1.1.5 aaa default-username ............................................................................................................................... 6
1.1.6 aaa directed-request ................................................................................................................................. 7
1.1.7 aaa group server ....................................................................................................................................... 8
1.1.8 debug aaa authentication.......................................................................................................................... 9
1.1.9 enable password ..................................................................................................................................... 10
1.1.10 server .................................................................................................................................................... 12
1.1.11 show users ............................................................................................................................................ 13
1.1.12 service password-encryption................................................................................................................. 14
1.1.13 username .............................................................................................................................................. 15
Chapter 2 RADIUS Command............................................................................................................................................ 17
2.1 RADIUS Command ............................................................................................................................................. 17
2.1.1 debug radius............................................................................................................................................ 17
2.1.2 ip radius source-interface........................................................................................................................ 18
2.1.3 radius challenge-noecho ......................................................................................................................... 19
2.1.4 radius dead-time...................................................................................................................................... 20
2.1.5 radius server............................................................................................................................................ 21
2.1.6 radius optional-passwords....................................................................................................................... 22
2.1.7 radius key................................................................................................................................................ 23
2.1.8 radius retransmit...................................................................................................................................... 24
2.1.9 radius timeout.......................................................................................................................................... 25
2.1.10 radius vsa send ..................................................................................................................................... 26
Chapter 3 802.1x command ............................................................................................................................................... 28
3.1.1 dot1x port-control .................................................................................................................................... 28
3.1.2 dot1x multiple-hosts ................................................................................................................................ 29
3.1.3 dot1x default............................................................................................................................................ 29
3.1.4 dot1x max-req ......................................................................................................................................... 30
3.1.5 dot1x reauth-max .................................................................................................................................... 31
3.1.6 dot1x re-authentication............................................................................................................................ 32
3.1.7 dot1x timeout quiet-period....................................................................................................................... 32
3.1.8 dot1x timeout re-authperiod .................................................................................................................... 33
3.1.9 dot1x timeout tx-period............................................................................................................................ 34
3.1.10 dot1x user-permit .................................................................................................................................. 34
3.1.11 dot1x authentication method ................................................................................................................. 35
3.1.12 dot1x authen-type.dot1x authentication type......................................................................................... 36
3.1.13 aaa authentication dot1x ....................................................................................................................... 37
-I-
Content
- II -
05-Security command
This Chapter describes the commands used for configuring the AAA authentication
method. Authentication defines the access right of the users before they are allowed to
access the network and network service.
Please refer to “Configuration Authentication” for information on how to use the AAA
method to configure the authentication. Please refer to the last part for examples of the
documentation “Example” to review the examples configured by the commands in this
Chapter.
AAA authentication shall be enabled so as to determine whether a user has the access
to the command of privileged priority by using the command “ aaa authentication
enable default”. The authentication method can be closed by using the “no” format of
the said command.
Syntas
Parameter
Parameter Description
Method one of the key words at the least in list 1.
Default
If default is not set, the enable password shall be used to make authentication, it has
the same effect as the command below.
If the enable password exists in configuration list, the password should be used. If no
password is set, the final feedback result will recognize the success of authentication.
Command mode
-1-
05-Security command
Explanation
The command “aaa authentication enable default” can be used to create a series of
authentication methods, which are used to determine whether a user has the right to
use the privileged commands. The keyword “method” has been explained in form 1.
Only when the previous authentication method feeds back error, other authentication
methods shall be applied. If the feedback result of the said authentication method
informs the failure of the authentication, other authentication method shall be
employed. If all the authentication method is expected to feed back the result of failure
and the authentication still succeeds, “none” can be designated as the last
authentication method of command line.
On top of that, when the method of RADIUS or TACACS+ is available for making
authentication of enable, the user names applied are different. The user name shall be
“$ENABLElevel$” in case “RADIUS” is used for authentication. The “level” in the user
name refers to the privileged level accessible to the user. When TACACS+ is used for
authentication, the user name is the one used when the user log on the switch. The
relevant specific configuration can be referred to as the part of “AAA Authentication
Configuration” in the document.
Figuer 1-1 Effective Default Method of AAA Authentication
The server group is used for authentication. But when the user designates
group-restrict
a server, the server group is disabled.
Example
An authentication list is created in the following example. The list first tries to connect
with TACACS+ server. If no error is fed back by TACACS+ server or no server is found,
AAA will try using the enable password. Should the error be fed back to such trial (as
no effective password is configured on the server), the user will be allowed to access
the server without authentication.
aaa authentication enable default tacacs+ enable none
Relevant command
enable password
-2-
05-Security command
The global configuration command “aaa authentication login” shall be used for setting
AAA authentication at the time of login. The “no” format of the command can be used
to close AAA authentication.
Syntas
Parameter
Parameter Description
Default It uses the listed authentication method following the parameter as the
default authentication method list at the time of the user’s login.
list-name It is used to name the character string of authentication method list. When
the user logs in, the methods listed in authentication method list will be
activated.
method It is one of the key words described in the Form 2 at the least.
Default
If no default method list is set, the default will not make authentication. At this moment,
it has the same effect as the one below:
Command mode
Explanation
The default list or other naming list created by the command “aaa authentication login”
will act on some specific line using the command “login authentication”.
Only when the said authentication method feeds back error, other authentication
methods will be used. Should the said authentication method feed back the failure, no
other authentication methods will be used. To ensure the success of authentication
even if all authentication methods feed back error, “none” shall be designated as the
last method of the command line.
-3-
05-Security command
The server group is used for authentication. But when the user designates
group-restrict
a server, the server group is disabled.
Example
AAA authentication methods list named “TEST” is created in the following example.
This authentication first tries to connect with TACACS+ server. If no error is fed back
by TACACS+ or no server is found, AAA will try using the enable password. Should
error be fed back to such attempt (as no enable password is configured on the switch),
the user will be allowed to access the network without authentication.
aaa authentication login TEST tacacs+ enable none
The same list is created in the Example below, but the default list is set. If no other lists
are designated, the list will be used for all the login authentication.
aaa authentication login default tacacs+ enable none
Relevant command
None
Syntas
Parameter
Parameter Description
-4-
05-Security command
test-string It is used to prompt the user of the text displayed at the time of password
input.
Default
When the user-defined text-string is not used, the password prompt is “Password”.
Command mode
Explanation
The displayed default literal information prompting the user password input can be
changed by using the command “aaa authentication password-prompt”. The command
not only changes the password prompt of the enable password, it also changes the
password prompt of login password. The “no” format of the command restores the
password prompt to default value.
Password:
The command “aaa authentication password-prompt” does not change any prompting
information provided by remote TACACS+ or RADIUS server.
Example
Relevant command
enable password
Syntas
-5-
05-Security command
Parameter
Parameter Description
text-string It is used to prompt the user of the text to be displayed at the time of the
user name input.
Default
When there is no user-defined text-string, the prompting character string of the user
name is “Username”.
Command mode
Explanation
Username:
Some protocols (such as TACACS+) have the capability to cover the prompting
information of local username. Under such circumstances, the use of the command
“aaa authentication username-prompt” will not change the prompting character string
of username.
Note: The command “aaa authentication username-prompt” does not change any
prompting information provided by remote TACACS +server.
Example
The following Example will change the prompt of username into the displayed
character string.
aaa authentication username-prompt YourUsernam:
Relevant command
When the user is not authenticated, a default username will be set for the user. The
command below can be used for changing the character string used by the default
username. The “no” format of the command can be used to restore its default value.
-6-
05-Security command
Syntas
no aaa default-username
Parameter
Parameter Description
username character string of default username.
Default
Command mode
Explanation
If the user carries out the authorized operation under the case of no authentication and
uses default username, the service available for the user will be limited to the authority
corresponding to the default username.
Example
Relevant command
None
Syntas
no aaa directed-request
Parameter
Parameter Description
-7-
05-Security command
Default
Default does not allow use of the server designated by this method and is preferred to
be used first
Command mode
Explanation
The command “aaa directed-request” can be used if the user is allowed to designate
the AAA Server preferred to be used first through the format of
username@host-ip-address. The “no” format of the command can be used to forbid
this form.
Example
The Example below allows use of the form of @host-ip-address to designate the AAA
Server preferred to be used first, but @host-ip-address is not used as a part of the
username.
The commands below are used to access to the configuration level of server group for
supporting the configuration of AAA server group. The “no” format of the command is
used to delete the configured server group.
Syntas
Parameter
Parameter Description
group-name Character string of the name of the server group.
Default
no server Group
-8-
05-Security command
Command mode
Explanation
Accessing to configuration level of server group by using the command, then adding
the corresponding sever to the group.
Example
The said command is used for adding a radiusserver group named ““radius-group”.
Relevant command
server
The command “debug aaa authentication” can be used for tracing the authentication
process of the user. The “no” format of the command is used to close the debug
information.
Syntas
Parameter
None
Default
Command mode
Supervisor mode
-9-
05-Security command
Explanation
The command can be used for tracing the authentication process of each user to find
out the cause of the failure of authentication.
Example
Use authen method LOCAL The local authentication method is used. UserID
(0x1f74208) 0x1f74208.
Authen ERROR (0x1f74208)! Use next The method of local “none” completes the authentication
method by using the next authentication method in the method
list.
Authen FAIL(0x1f74208)! Method-list After having polled all the authentication methods, the
polling finish authentication fails here.
Relevant command
None
- 10 -
05-Security command
Parameter
Parameter Description
password plaintext of character-string of password
Default
None
Command mode
Explanation
The password of switch configuration contains no blank, namely at the time of using
the command “enable password”, the blank shall not be entered when the plaintext of
password needs to be entered directly. The length of plain password can not exceed
126 characters.
When no level parameter is entered, the default parameter is level 15. The higher the
privileged level, the more the authority. If no password is configured to a privileged
level, no authentication will be made when the user accesses this privileged level.
Currently there are only two encryption-types supported by our switch system. The
parameters in the commands are 0 and 7 respectively. 0 stands for 0, meaning no
encryption. The following encrypted-password is entered directly using the plaintext of
password. This method has the same effect as the method of direct input of password
parameter without adding encryption-type. “7” represents a kind of algorithm defined
by Our Company for encrypting. The encrypted cipher text of password is needed to
be entered in the following encrypted-password. The cipher text can be copied from
other configuration files of the switch.
Example
The password added by the following Example for privileged level 10 is clever. The
encryption-type applied is 0, namely the plaintext of password.
enable password 0 clever level 10
The password added by the following Example for the default privileged level (15) is
Oscar. The encryption-type applied is 7, namely the encryption method. The cipher text
of the password is needed to be entered.
enable password 7 074A05190326
- 11 -
05-Security command
Given the assumption that the cipher text of Oscar is 074A05190326, the value of the
cipher text is obtained from the configuration file of another switch.
Relevant command
service password-encryption
1.1.10 server
The command is used for adding a server in an AAA server group. The “no” format of
the command is used for deleting a server.
Syntas
server A.B.C.D
no server A.B.C.D
Parameter
Parameter Description
A.B.C.D IP address of server
Default
no server
Command mode
Explanation
Example
server 12.1.1.1
The above command is used for adding the server whose address is 12.1.1.1 to server
group.
- 12 -
05-Security command
Relevant command
The command “show users” can be used for showing the summary information of all
the on-line users.
Syntas
show users
Parameter
None
Default
None
Command mode
Supervisor mode
Explanation
The command is used for showing all the on-line users, including the information below:
port, username, service type, authentication method, time online and IP peer address.
Example
#show users
Port User Service Auth_Meth Time Peer-address
===============================================================
0 someone exec unknown 2d06h01m(m) unknown
2 admin ppp local 2d01h10m(m) 192.168.30.87
Parameter Description
Area Explanation
Port The index number of Vty or ID of the interface where the user is located.
- 13 -
05-Security command
Relevant command
username
The command can be used for encrypting the relevant password in the system. The
“no” format of the command can be used for canceling the encryption of the new set
password.
Syntas
service password-encryption
no service password-encryption
Parameter
None
Default
Command mode
Explanation
Currently in the implement of the switch system of Our Company, the command is
related to the commands of “username password enable password and password. If
the command is not configured (i.e. under default status) and the said three commands
are stored in the plaintext of the password, the plaintext of the configured password
can be shown in the command “show running-config”. Once the command is
configured, the password configured in the said three commands will be encrypted.
The plaintext of the configured password is not shown in the command “show
running-config”. The command “no service password-encryption” can not restore the
display of the plaintext of the password. So the configured password shall be
confirmed before the command is used for encryption. The command “no service
password-encryption” is effective only to the password configured after the command
is used and has no effect on the encrypted password configured before the command
is used.
- 14 -
05-Security command
Example
switch_config#service password-encryption
The command is used for encrypting the configured plaintext password and encrypting
the plaintext password after the command is used.
Relevant command
enable password
password
1.1.13 username
The command can be used for adding the user to the database of local users,
authentication of local method and authorization. The “no” format of the method can be
used for deleting the corresponding user.
Syntas
no username username
Parameter
Parameter Description
username Character String of User Name
The maximum links to the switch, the same user can create at the same
user-maxlinks
time (Statistic is made only to the user passing the local authentication.
When the user logs in the switch, the designated command will be
autocommand
executed automatically.
- 15 -
05-Security command
Default
No user
Command mode
Explanation
Currently there are only two encryption-types supported by our switch system. The
parameters in the commands are 0 and 7 respectively. 0 stands for 0, meaning no
encryption. The plaintext of password is entered directly in the following
encrypted-password. This method has the same effect as the method of direct input of
password parameter without adding encryption-type. 7 represents a kind of algorithm
defined by Our Company for encrypting. The encrypted ciphertext of password is
needed to be entered in the following encrypted-password. The ciphertext can be
copied from other configuration files of the switch.
Example
The local user is added in the Example below. The username is someone, the
password is someother.
username someone password someother
The local user is added in the Example below, the username is Oscar, the password is
Joan. The encryption type applied is 7, namely the encryption method, the ciphertext of
the password is needed to be entered.
enable password 7 1105718265
Given the assumption that the ciphertext of Joan is 1105718265, the value of the
ciphertext is obtained from the configuration files of other switches.
Relevant command
- 16 -
05-Security command
The command “debug radius” can be executed for tracing RADIUS event or packet.
The “no” format of the command can be used for closing debug information.
Syntas
Parameter
Parameter Description
Default
none
Command mode
Supervisor mode
Explanation
The command can be used for debugging network system to find out the cause of
authentication failure.
switch#debug radius event
RADIUS:return message to aaa, Give me your username
RADIUS:return message to aaa, Give me your password
- 17 -
05-Security command
Return packet to aaa, Give me your The password corresponding to the username wanted.
password
inital transmit access-request [4] to The first authentication request is sent to the RADIUS
192.168.20.126 1812 <length=70> server. The address of the server is 192.168.20.126, the
port number is 1812, the length of packet is 70.
retransmit access-request [4] to Server does not echo the request and authentication
192.168.20.126 1812 <length=70> request is retransmitted.
Have tried all servers return error to The authentication is completed by using RADIUS and
aaa the error is returned.
Example
The global configuration command “ip radius source-interface” is used for compelling
RADIUS to use IP address of the designated interface for all the packets transmitted
by RADIUS. The “no” format of the command is used for restoring the default value.
Syntas
no ip radius source-interface
Parameter
Parameter Description
- 18 -
05-Security command
Default
The command has no default value designated by the manufacturer, i.e., the source IP
address should be determined on the real condition.
Command mode
Explanation
The command is used for selecting the IP address of an interface as the source
address of sending out RADIUS packet. So long as the interface is under “up” state,
the address will be used continuously. Thus, for each client accessing the network,
RADIUS server only uses one IP address rather than maintaining an IP address list.
The command is especially useful when the switch has many interfaces and intends to
ensure that all RADIUS packets coming from some specific switch has the same IP
address.
The designated interface shall have IP address related to the interface. If the
designated interface does not have an IP address or is under a “down” state, RADIUS
will restore to the default value. In order to avoid the case, IP address should be added
to the interface and the interface shall be ensured under “up” state.
Example
The following Example allows RADIUS to use IP address of the interface VLAN1 for all
RADIUS packets used.
ip radius source-interface vlan1
Relevant command
ip tacacs source-interface
The command “radius challenge-noecho” shall be used for not showing the user data
under the Access-Challenge Mode.
Syntas
radius challenge-noecho
no radius challenge-noecho
Parameter
none
- 19 -
05-Security command
Default
Command mode
Explanation
none
Example
radius challenge-noecho
The global configuration command “radius dead-time” shall be used for improving the
echo time of RADIUS when some servers are not workable. The command allows the
system to skip the unworkable servers. The “no” format of the command can be used
for setting dead-time as 0, namely, all the servers are thought to be workable.
Syntas
no radius dead-time
Parameter
Parameter Description
minutes The time length of RADIUS server thought to be unworkable, the
maximum length is 1440 minutes (24 hours)
Default
The unworkable time is set as 0, meaning that the server is thought to be workable all
the time.
Command mode
- 20 -
05-Security command
Explanation
The command is used for labeling those RADIUS servers that do not respond to the
authentication request as “dead”, which avoids too long waiting for the response
before using the next server. The RADIUS server labeled as “dead” is skipped by all
the requests during the set minutes unless otherwise all the servers are labeled as
“dead”.
Example
The following Example designates 5-minute dead time for the RADIUS server that
does not respond to the request.
radius dead-time 5
Relevant command
radius server
radius retransmit
radius timeout
The global configuration command “radius server” is used for designating IP address
of radius server. The “no” format of the command is used for deleting the designated
RADIUS host.
Syntas
Parameter
Parameter Description
port-number1 (optional item) The port number of authentication request. If the setting is
0, the host is not used for authentication.
acct-port (optional item) Designating UDP destination port for accounting request.
port-number2 (optional item) The port number of accounting request. If the setting is 0,
the host is not used for accounting.
- 21 -
05-Security command
Default
Command mode
Explanation
The command “radius server” can be used repeatedly for designating multiple servers.
The polling can be made under the order of configuration when necessary.
Example
The Example below designates RADIUS host whose IP address is 1.1.1.1. The default
port is used for accounting and authentication.
radius server 1.1.1.1
Relevant command
aaa authentication
radius key
tacacs server
username
The global configuration command “radius optional-passwords” is used for verifying the
username without checking password when RADIUS authentication request is
transmitted to RADIUS server for the first time. The “no” format of the command can
be used for restoring the default value.
Syntas
radius optional-passwords
no radius optional-passwords
- 22 -
05-Security command
parameter
none
Default
Command mode
Explanation
When the user enters login name, the authentication request will include the user
name and zero length password. If the authentication request is accepted, the login
authentication process is completed. If RADIUS server refuses the request, the server
will prompt the password input. When the user enters the password, the second
authentication will be tried. RADIUS server shall support the authentication of the user
of no password so as to take advantage of this feature.
Example
The following Example configures the exclusion of user password when the first
authentication request is transmitted.
radius optional-passwords
Relevant command
radius server
The global configuration command shall be used for setting encryption key for RADIUS
communication between the switch and RADIUS server. The “no” format of command
can be used for invalidating the encryption key.
Syntas
no radius key
Parameter
Parameter Description
- 23 -
05-Security command
string The secret key used for encrypting. The secret key shall match
with the one used by RADIUS server.
Default
Command mode
Explanation
The entered secret key shall match with the one used by RADIUS server. All the zero
space character is neglected. The secret key contains no space character.
Example
Relevant command
radius server
tacacs server
username
The global configuration command is used for designating the times of trial before
abandoning some server. The “no” format of the command can be used for restoring
default value.
Syntas
no radius retransmit
Parameter
Parameter Description
- 24 -
05-Security command
Default
3 trials
Command mode
Explanation
The command is usually used together with the command “radius timeout”, indicating
the time of the timeout of server response and the times of repeated trails after the
timeout.
Example
Relevant command
radius timeout
The global configuration command “radius timeout” is used for setting the time to wait
for the server response to the switch. The “no” format of the command is used for
restoring default value.
Syntas
no radius timeout
Parameter
Parameter Description
Default
5 seconds
- 25 -
05-Security command
Command mode
Explanation
The command is usually used together with the command “radius retransmit”.
Example
The global configuration command “radius vsa send” can be used for configuring the
switch into the one that is identified and uses special attribute of manufacturer (VSA).
The “no” format of the command can be used for restoring the default value.
Syntas
Parameter
Parameter Description
accounting (optional item) The identified special attribute of the
manufacturer is limited to the accounting attribute.
authentication (optional item) The identified special attribute of the manufacturer is
limited to the authentication attribute.
Default
Command mode
explanation
IETF uses special attribute of manufacturer (VSA) (attribute 26) and designates the
method for exchanging the special information of the manufacturer between the switch
and RADIUS server. VSA allows manufacturers to support their own extended attribute
- 26 -
05-Security command
not suitable to universal purposes. The command “radius vsa send” enables the switch
to identify and use the special attribute of the manufacturer (VSA) of authentication
and accounting. The keyword “accounting” is used in the command “radius vsa send”
to limit the identified special attribute of the manufacturer to the attribute of accounting.
The keyword “authentication” is used in the command “radius vsa send” to limit the
identified special attribute of the manufacturer to the attribute of authentication.
Example
The Example below configures the switch to enable it to identify and use the special
accounting attribute of manufacturer.
radius vsa send accounting
Relevant command
radius server
- 27 -
05-Security command
Syntas
no dot1x port-control
Parameter
Parameter Description
auto Enable 802.1xprotocol authentication method
Default
force-authorized
Explanation
802.1x protocol is a two-tier port based authentication method. Users may use autocommand to
enable the authentication method. The authentication method can only be configured in
physical port, which cannot be a vlan main force, dynamic storage, security port and monitor
port.
Command mode
Example
The following commands configure f0/23 to vlan main force and then enable 802.1x.
- 28 -
05-Security command
Syntas
dot1x multiple-hosts
no dot1x multiple-hosts
Parameter
none
Default
Explanation
After configuring a port to 802.1x, it can connect to multiple hosts (clients). Under this
mode, when a client pass the authentication, all the clients pass the authentication and
is able to access. If the port fails to pass authentication (re-authentication failed and
log-off is received), the port disable network accessing.
Command mode
example
Syntas
dot1x default
- 29 -
05-Security command
Parameter
none
Default
none
Explanation
Command mode
example
Syntas
no dot1x max-req
Parameter
Parameter Description
Count The Maximum Number for Identification Request. 1-10
Default
Explanation
Change the maximum identification request time according to the network environment
to ensure authentication between client and authentication server.
- 30 -
05-Security command
command mode
example
Syntas
no dot1x reauth-max
Parameter
Parameter Description
Count The maximum nuber for retry authentication request. 1-10.
Default
Explanation
Command mode
Example
- 31 -
05-Security command
Syntas
dot1x re-authentication
no dot1x re-authentication
Parameter
none
Default
none
Explanation
Command mode
Example
Syntas
Parameter
Parameter Description
Time dot1x re-enable re-authentication period. The range:0-65535s.
- 32 -
05-Security command
Default
60s
Explanation
When authentication fails, there will be a quiet time. During quiet time, switch will not
receive or enable any authentication.
Command mode
Example
Syntas
Parameter
Parameter Description
Time dot1x re-enable re-authentication period.the range: 1-4294967295s
Default
3600s
Explanation
Command mode
- 33 -
05-Security command
Example
Syntas
Parameter
Parameter Description
Time Time. 1- 65535s
Default
30s
Explanation
This command waits for the interval of client response. Over the interval, switch will
send the authentication request again.
Command mode
Example
Syntas
no dot1x user-permit
- 34 -
05-Security command
Parameter
Parameter Description
user_name User name
Default
Explanation
This command configure uers bundled under ports. 8 users can be bundled under
each port. When 802.1x is enabled, the switch authenticate the bundled users name. If
other users do not authenticate, the authentication fail.
Command mode
Example
Syntas
Parameter
Parameter Description
method-name Method name.
default
“Default” method
- 35 -
05-Security command
Explanation
This command configure authentication under ports. The method should be one of the
authentication method offered by AAAA. Every interface uses only one method. When
AAA is authenticating 802.1x users, AAA will select configured authentication method
to authenticate.
Command mode
Example
The following commands configure interface f0/1 authentication method to abcd. The
method users local users name for authentication.
Switch(config) #aaa authentication dot1x abcd local
Switch(config) #aaa authentication dot1x efgh radius
Switch(config) #int f0/1
Switch(config_f0/1)# dot1x authentication method abcd
Switch(config_f0/1)# int f0/2
Switch(config_f0/2)# dot1x authentication method efgh
Syntas
no dot1x authen-type
Configure Global mode dot1x authentication type. No command will restore default
value.
Parameter
None
Default
- 36 -
05-Security command
Explanation
This command configures authentication type. The type decides whether Chap or Eap
authentication will be applied to AAA. When using Chpa, the challenge needed by MD5
will be established locally. When using Eap, the challenge will be established on
authentication server. Every port uses only one authentication type. Under default, the
type uses Global configuration authentication type. When a port is configured one
authentication type, it uses the type until “Nocommand” restores the default value.
Command mode
Example
The following command configures interface f0/1 authentication type to Chap and
global authentication type is Eap.
Switch(config) #dot1x authen-type eap
Switch(config) #int f0/1
Switch(config_f0/1)# dot1x authentication type chap
Syntas
Parameter
Parameter Description
Default Uses the following method when users are authenticating.
method1 Enable
[method2...]
group radius
line
local
local-case
none
Default
no authentication
- 37 -
05-Security command
Explanation
Method parameter offers a series of methods for authenticating client password. For
802.1x aaa, the best authentication method is radius authentication. Users may user
local configuration information to authencate, such as local client password saved in
configuration uses enable and line.
Command mode
Example
Syntas
Parameter
none
Default
none
Explanation
Syntas
Parameter
none
- 38 -
05-Security command
Default
none
Explanation
Syntas
Parameter
None
Default
none
Explanation
Syntas
- 39 -
05-Security command
Parameter
Parameter Description
intf-id Specific physical interface
Default
none
Explanation
Command mode
Example
- 40 -
05-Security command
State Idle
Request Count 0
Identifier (Server) 20
Port Timer Machine
Auth Tx While Time 16
Backend While Time 16
reAuth Wait Time 3
Hold Wait Time 0
- 41 -
05-Security command
Syntas
Parameter
Parameter Description
name name of mac access-list.
Default
none
Command mode
Example
4.1.2 permit
Syntas
- 42 -
05-Security command
Parameter
Parameter Description
any Any value.
host Host.
Default
Deny all.
Explanation
Example
4.1.3 deny
Syntas
Parameter
Parameter Description
any
host
src-mac-addr H.H.H
- 43 -
05-Security command
dst-mac-addr H.H.H
Default
Deny all.
Explanation
Example
Syntas
Apply the created MAC access-list to the interface, or delete the MAC access-list
applied to the interface.
Parameter
Parameter Description
name name of mac access-list
Default
Explanation
Example
- 44 -
05-Security command
Syntas
switchport port-security
no switchport port-security
Parameter
none
Default
none
Explanation
Example
Syntas
- 45 -
05-Security command
Address bind can be deleted by using instruction “NO”. Also all addresses on port
can be deleted, system will exit port binding state at the same time.
Parameter
none
Default
none
Explanation
In default, this function is off. The port will work in bind state if a bind address is
configured, excepting clear up all bind entries by use of “NO” instruction..
Example
Configuring interface f0/3 bind IP address 1.2.3.4 and MAC address 0001.0001.1111,
IP address 2.3.4.5 and MAC address 6666.7777.8888.
switch(config)# interface f0/3
switch(config-if)# switchport port-security bind ip 1.2.3.4 mac 0001.0001.1111
switch(config-if)# switchport port-security bind ip 2.3.4.5
switch(config-if)# switchport port-security bind mac 6666.7777.8888
Syntas
Parameter
Parameter Description
protect protect mode do notnotify error inmormation.
- 46 -
05-Security command
Default
Explanation
Example
Syntas
Parameter
Parameter Description
value Set max number of security MAC. The range:1 132
Default
Default value is 1.
Explanation
Example
If interface f0/3 is enable as security port, the max MAC address number is set to be
10.
Switch(config-if)# switchport port-security maximum 10
- 47 -
05-Security command
Syntas
Parameter
Parameter Description
mac-addr MAC address.
Default
none
Explanation
Example
Set 0001.0.1 to be the static security MAC address of security port interface f0/3
Syntas
Parameter
Parameter Description
aging-time learned aging-time of security MAC address dynamically.the range: 10
1000000
- 48 -
05-Security command
Default
300 seconds
Explanation
Example
configure MAC address aging-time of dynamic security port interface f0/3 to be 100
seconds
Switch(config-if)# switchport port-security aging-time 100
Syntas
Parameter
Parameter Description
interface-id Port name
Default
none
Explanation
Supervisor mode
Example
- 49 -
05-Security command
Syntas
Parameter
Parameter Description
interface-id Interface id
Default
none
Explanation
Supervisor mode
Example
- 50 -
05-Security command
Syntas
web-auth enable
no web-auth enable
Enable the web authentication function. No command will restore default value.
Parameter
None
Default
Web-auth is disabled.
Explanation
Enable the web authentication function on routing interface(ethernet type). Once the
function is enabled, the interface is under the control of web authentication.
Command mode
Example
Syntas
no web-auth accounting
Configure the accounting method list for the routing interface. No command will restore
default value.
Parameter
Parameter Description
method-name The name of the accounting method list configured in AAA .
Default
Explanation
Network accessing through the interface will be accounted with the accounting method
included in this method list .if the value is not set, the “default ” method list will be
used.
Command mode
Example
The following commands first configure a method named weba-acct, and then set this
method list on interface VLAN5:
Switch_config# aaa accounting network weba-acct start-stop radius
Switch_config_v5# web-auth account weba-acct
Syntas
no web-auth authentication
Configure the authentication method list for the routing interface. No command will
restore default value.
Parameter
Parameter Description
method-name The name of the authentication method list configured in AAA
- 52 -
05-Security command
Default
Explanation
Network accessing through the interface will be authenticated with the authentication
method included in this method list .if the value is not set, the “default ” method list will
be used.
Command mode
Example
The following commands first configure a method named weba-auth, and then set this
method list on interface VLAN5:
Switch_config# aaa authentication login weba local
Switch_config_v5# web-auth authentication weba
Syntas
no web-auth mode
Parameter
user N/A
Default
Explanation
Set authentication user .when you use the user name/password,you need fill in user
name /password in the web interface;when you use VLAN ID,you only need beat the
logging key in the web interface.
- 53 -
05-Security command
Command mode
Example
Syntas
no web-auth keep-alive
Configure the interval client’s browser use to send online indication messages in
seconds. No command will restore default value.
Parameter
Parameter Description
keep-alive-time The interval client’s browser use to send online indication messages. The
range: 60-65535
Default
Explanation
Once the keep alive time is reconfigured, the user authenticated after the action will
send online indication messages at this interval, but the user authenticated before the
action will use this value only after one online indication message has been send.
Command mode
Example
- 54 -
05-Security command
Syntas
no web-auth holdtime
Use web-auth holdtime to set the duration in seconds before the switch block a user’s
network accessing after not receiving the online indication message. No command will
restore default value.
Parameter
Parameter Description
holdtime The duration in seconds before the switch block a user’s network
accessing after not receiving the online indication message. The range:
60-65535
Default
Explanation
The switch will block the user’s network accessing after not receiving the online
indication message for the holdtime. The switch will also stop accounting for the user
at the mean time.
Command mode
Example
Syntas
no web-authtime
- 55 -
05-Security command
Use web-auth holdtime to set the duration in seconds before the switch terminate the
authentication process after not completing the authentication process. No command
will restore default value.
Parameter
Parameter Description
authtime The duration in seconds before the switch terminate the authentication
process after not completing the authentication process
Default
Explanation
Command mode
Example
Syntas
no web-auth portal-server
Configure the IP address of the portal server. No command will restore default value.
Parameter
Parameter Description
A.B.C.D The IP address of the portal server
- 56 -
05-Security command
Default
0.0.0.0
Explanation
The switch will replace the IP address in the answer sections of the DNS response
message sent to user, before the user passes the authentication.
Command mode
Example
Syntas
no web-auth vlan-password
Parameter
Default
None
Explanation
When you use vlan id authenazation , the switch use the ”vlan n” as a user name ,
thereinto the “n”as the VLAN number ,and the command configuration password is
as the all user password of using vlan id authenazation .
Command mode
- 57 -
05-Security command
Example
Syntas
Use web-auth kick-out to kick out the user with the IP address.
Parameter
Parameter Description
A.B.C.D The IP address of the user to be kicked out
Default
None
Explanation
The switch kicks out the user by its IP address regardless of having passed the
authentication or being authenticated. The switch will stop accounting on the user if the
accounting has been launched before.
Command mode
Supervisor mode
Example
The following command kick out the user whose IP address is 192.168.20.43:
Syntas
Show web-auth
Use show web-auth command to display the global configuration of the web
authentication.
- 58 -
05-Security command
Parameter
None
Default
None
Explanation
This command is used to display the current global configuration for the web
authentication on the switch.
Command mode
Supervisor mode
Example
The following command displays the current global configuration for the web
authentication on the switch:
Switch_config#show web-auth
web authentication parameters
holdtime 3600
authtime 600
keep-alive 60
portal-server 192.168.20.41
Syntas
Use show web-auth interface command to display the web authentication on the
designated interface.
Parameter
Parameter Description
inertacef number The ID of the interface to be displayed.
Default
None
- 59 -
05-Security command
Explanation
This command is used to display the current web authentication configuration on the
designated interface.
Command mode
Supervisor mode
Example
The following command displays the current web authentication configuration on the
interface VLAN1:
Switch_config#show web-auth interface Vlan 1
web authentication parameters
web-auth enable
account-method weba-acct
authen-method weba
mode user
Syntas
Use show web-auth user command to display the current user list in the switch.
Parameter
None
Default
None
Explanation
This command is used to display the current user list in the switch include users who is
online and users who is being authenticated.
Command mode
Supervisor mode
- 60 -
05-Security command
Example
The following command displays the current user list in the switch:
Switch#show web-auth user
IP MAC-ADDR state remain-time(seconds)
192.168.20.42 0008.74b7.3de1 WEBA_USER_AUTHENTICATED 3572
-------------------------------------
authenticated users: 1, authenticating users: 0
Syntas
Parameter
None
Default
None
Explanation
This command is used to display the event occurring when authentication, such as
having received authentication request, authentication fail, authentication successful.
Command mode
Supervisor mode
Example
Syntas
- 61 -
05-Security command
Use debug web-auth event command to displays the errors occurring during
authentication.
Parameter
None
Default
None
Explanation
This command is used to display the error occurring in authentication, the information
is helpful for diagnosing the problem.
Command mode
Supervisor mode
Example
Syntas
Parameter
None
Default
None
Explanation
This command can make “debug web-auth event “ output information more
particular,and make it output the MAC address of the correlation event by any
possibililty .
- 62 -
05-Security command
Command mode
Privilege mode
Example
Syntas
Use debug web-auth http event command to display the http event during
authentication.
Parameter
None
Default
None
Explanation
This command is used to display the http event occurring during authentication, such
as receiving of http request, and connection disconnected.
Command mode
Supervisor mode
Example
Syntas
Use debug web-auth http request command to dump the content of the http request.
- 63 -
05-Security command
Parameter
None
Default
None
Explanation
Command mode
Supervisor mode
Example
Syntas
Use debug web-auth event command to turn on all the debug option related to http in
web authentication.
Parameter
None
Default
None
Explanation
This command is used to turn on all the debug option related to http in web
authentication.
Command mode
Supervisor mode
- 64 -
05-Security command
Example
Syntas
Use debug web-auth event command to turn on all the debug option in web
authentication.
Parameter
None
Default
None
Explanation
This command is used to turn on all the debug option in web authentication.
Command mode
Supervisor mode
Example
switch#debug web-auth
- 65 -