Switch 7700 Command reference Guide, v2.0

Table Of Contents
802.1x Configuration Commands 353
interface interface-list: Ethernet interface list including several Ethernet
interfaces, expressed in the format interface-list = { interface-num [ to
interface-num ] } & < 1-10 >. interface-num specifies a single Ethernet interface in
the format interface-num = { interface-type interface-num | interface-name },
where interface-type specifies the interface type, interface-num specifies the
interface number and interface-name specifies the interface name. For the
respective meanings and value ranges, see the parameters in the Port Command
chapter.
Description
Use the dot1x max-user command to configure a limit to the amount of
supplicants on the specified interface of 802.1x.
Use the undo dot1x max-user command to restore the default value.
This command is used for setting a limit to the amount of supplicants that 802.1x
can hold on the specified interface. This command has effect on the interface
specified by the parameter
interface-list when executed in system view. It has
effect on all the interfaces when no interface is specified. The parameter
interface-list cannot be input when the command is executed in Ethernet
interface view and it has effect only on the current interface.
Related command: display dot1x.
Example
Configure the interface Ethernet 1/0/2 to hold no more than 32 users.
[SW7700]dot1x max-user 32 interface ethernet 1/0/2
dot1x port-control Syntax
dot1x port-control { auto | authorized-force | unauthorized-force-}
[ interface interface-list ]
undo dot1x port-control [ interface interface-list ]
View
System view
Ethernet interface view
Parameter
auto: Automatic identification mode, configuring the initial state of the interface
as unauthorized. The user is only allowed to receive or transmit EAPoL packets but
not to access the network resources. If the user passes the authentication flow, the
interface will switch over to the authorized state and then the user is allowed to
access the network resources. This is the most common case.
authorized-force: Forced authorized mode, configuring the interface to always
stay in authorized state and the user is allowed to access the network resources
without authentication/authorization.
unauthorized-force: Forced unauthorized mode, configuring the interface to
always stay in non-authorized mode and the user is not allowed to access the
network resources.