Page 36 / 757 Scroll up to view Page 31 - 35
xStack
®
DGS-3600 Series Layer 3 Gigabit Ethernet Managed Switch CLI Manual
32
Command
Parameters
enable 802.1x
disable 802.1x
create 802.1x user
< username 15 >
delete 802.1x user
< username 15 >
show 802.1x user
config 802.1x auth_protocol
[ local | radius_eap ]
config 802.1x fwd_pdu system
[ enable | disable ]
config 802.1x fwd_pdu ports
[ < portlilst > | all ] [ enable | disable ]
config 802.1x authorization network
radius
[ enable | disable ]
show 802.1x
{ [ auth_state | auth_configuration ] ports { < portlist > } }
config 802.1x capability ports
[ < portlist > | all ] [ authenticator | none ]
config 802.1x max_users
[<value 1 – 4000> | no_limit]
config 802.1x auth_parameter ports
[ <portlist> | all ][ default |{ direction [ both | in ]| port_control [ force_unauth |
auto | force_auth ] | quiet_period < sec 0-65535> | tx_period < sec 1-65535> |
supp_timeout < sec 1-65535>| server_timeout < sec 1-65535> | max_req <
value 1-10> | reauth_period < sec 1-65535> | enable_reauth [ enable | disable ] |
max_users [ < value 1 – 128 > | no_limit ]} (1)]
config 802.1x auth_mode
[ port_based | mac_based ]
config 802.1x init
[ port_based ports [ < portlist | all > ] | mac_based ports [ < portlist > | all ] {
mac_address < macaddr > }]
config 802.1x reauth
[ port_based ports [ < portlist | all >]| mac_based ports [ < portlist > | all ] {
mac_address < macaddr > }]
create 802.1x guest_vlan
{ < vlan_name 32 > }
delete 802.1x guest_vlan
{ < vlan_name 32 > }
config 802.1x guest_vlan ports
[ < portlist > | all ] state [ enable | disable ]
show 802.1x guest_vlan
config radius add
< server_index 1-3 > [ < server_ip > | < ipv6addr > ] key < passwd 32 > [ default
| { auth_port < udp_port_number 1-65535 > | acct_port < udp_port_number 1-
65535 > | timeout < int 1-255 > | retransmit < int 1-20 > } (1)]
config radius delete
< server_index 1-3 >
config radius
<server_index 1-3> { ipaddress [ <server_ip> | <ipv6addr> ] | key <passwd 32> |
auth_port [<udp_port_number>| default ] | acct_port [ <udp_port_number> |
default ] | timeout [ <int 1-255> | default ] | retransmit [ <int 1-20> | default ]} (1)
show radius
show auth_statistics
{ports [<portlist> | all]}
show auth_diagnostics
{ports [<portlist> | all]}
show auth_session_statistics
{ports [<portlist> | all]}
show auth_client
show acct_client
config accounting service
[ network | shell | system ] state [ enable | disable ]
show accounting service
Page 37 / 757
xStack
®
DGS-3600 Series Layer 3 Gigabit Ethernet Managed Switch CLI Manual
33
Each command is listed, in detail, in the following sections.
enable 802.1x
Purpose
Used to enable the 802.1X function.
Syntax
enable 802.1x
Description
The enable 802.1x command enables 802.1X function.
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example usage:
Used to enable the 802.1X function:
DGS-3627:admin#enable 802.1x
Command: enable 802.1x
Success.
DGS-3627:admin#
disable 802.1x
Purpose
Used to disable the 802.1X function.
Syntax
disable 802.1x
Description
The disable 802.1x command disable 802.1X function.
Parameters
None.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example usage:
To disable the 802.1X function:
DGS-3627:admin# disable 802.1x
Command: disable 802.1x
Success.
DGS-3627:admin#
create 802.1x user
Purpose
Used to create an 802.1X user.
Syntax
create 802.1x user < username 15 >
Description
The create 802.1x user command create an 802.1X user.
Parameters
username
- Specifies adding user name.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example usage:
Page 38 / 757
xStack
®
DGS-3600 Series Layer 3 Gigabit Ethernet Managed Switch CLI Manual
34
To create an 802.1x user “test”:
DGS-3627:admin# create 802.1x user test
Command: create 802.1x user test
Enter a case-sensitive new password:
Enter the new password again for confirmation:
Success.
DGS-3627:admin#
delete 802.1x user
Purpose
Used to delete an 802.1X user.
Syntax
delete 802.1x user < username 15 >
Description
The delete 802.1x user command delete an 802.1X user.
Parameters
username
- Specifies the adding user name.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example usage:
To delete user “test”:
DGS-3627:admin# delete 802.1x user test
Command: delete 802.1x user test
Are you sure to delete the user?(y/n)
Success.
DGS-3627:admin#
show 802.1x user
Purpose
Used to display the 802.1X user.
Syntax
show 802.1x user
Description
The show 802.1x user command displays the 802.1X user account information.
Parameters
None.
Restrictions
None.
Example usage:
To display the 802.1X user information:
Page 39 / 757
xStack
®
DGS-3600 Series Layer 3 Gigabit Ethernet Managed Switch CLI Manual
35
DGS-3627:admin# show 802.1x user
Command: show 802.1x user
Username
Password
----------
----------
user1
abcds
Total Entries : 1
DGS-3627:admin#
config 802.1x auth_protocol
Purpose
Used to configure the 802.1X auth protocol.
Syntax
config 802.1x auth_protocol [ local | radius_eap ]
Description
The config 802.1x auth_protocol command configures the 802.1X authentication protocol.
Parameters
local
- Specifies the authentication protocol as local.
radius_eap
- Specifies the authentication protocol as RADIUS EAP.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example usage:
To configure the 802.1X authentication protocol to RADIUS EAP:
DGS-3627:admin# config 802.1x auth_protocol radius_eap
Command: config 802.1x auth_protocol radius_eap
Success.
DGS-3627:admin#
config 802.1x fwd_pdu system
Purpose
Used to configure forwarding of EAPOL PDU when 802.1X is disabled.
Syntax
config 802.1x fwd_pdu system [ enable | disable ]
Description
This is a global setting to control the forwarding of EAPOL PDU. When 802.1X functionality is
disabled globally or for a port, and if 802.1X fwd_pdu is enabled both globally and for the
port, a received EAPOL packet on the port will be flooded in the same VLAN to those ports
for which 802.1X fwd_pdu is enabled and 802.1X is disabled (globally or just for the port).
The default state is disabled.
Parameters
enable
- Enable the forwarding of EAPOL PDU.
disable
- Disable the forwarding of EAPOL PDU.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example usage:
To configure forwarding of EAPOL PDU system state enable:
Page 40 / 757
xStack
®
DGS-3600 Series Layer 3 Gigabit Ethernet Managed Switch CLI Manual
36
DGS-3627:admin# config 802.1x fwd_pdu system enable
Command: config 802.1x fwd_pdu system enable
Success.
DGS-3627:admin#
config 802.1x fwd_pdu ports
Purpose
Used to configure if the port will flood EAPOL PDU when 802.1X functionality is disabled.
Syntax
config 802.1x fwd_pdu ports [ < portlilst > | all ] [ enable | disable ]
Description
This is a per port setting to control the forwarding of EAPOL PDU. When 802.1X functionality
is disabled globally or for a port, and if 802.1X fwd_pdu is enabled both globally and for the
port, a received EAPOL packet on the port will be flooded in the same VLAN to those ports
for which 802.1X fwd_pdu is enabled and 802.1X is disabled (globally or just for the port).
The default state is disabled.
Parameters
ports
- Specifies a range of ports to be configured.
all
- All ports.
enable
- Enable forwarding EAPOL PDU receive on the ports.
disable
- Disable forwarding EAPOL PDU receive on the ports.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example usage:
To configure 802.1X fwd_pdu for ports:
DGS-3627:admin# config 802.1x fwd_pdu ports 1,2 enable
Command: config 802.1x fwd_pdu
ports 1,2 enable
Success.
DGS-3627:admin#
config 802.1x authorization network radius
Purpose
The enable or disable the acceptation of an authorized configuration.
Syntax
config 802.1x authorization network radius [ enable | disable ]
Description
The command config 802.1x authorization attributes is used to enable or disable the
acception of authorized configuration.
When the authorization is enabled for 802.1X’s RADIUS authentication, the authorized
attributes assigned by the RADUIS server will be accepted if the global authorization status is
enabled.
Parameters
radius
- If specified to enable, the authorization attributes assigned by the RADUIS server will
be accepted if the global authorization status is enabled. The default state is enabled.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example usage:
The following example will disable to accept the authorized data assigned from the RADIUS server:

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top