Before being authenticated, users need to obtain some network access rights to meet basic network access requirements such as downloading the 802.1X client and updating antivirus database. The device uses an authentication-free rule profile to uniformly manage authorization information for authentication-free users. You can define some network access rules in the profile to determine network access rights that can be obtained by authentication-free users. You need to bind a configured authentication-free rule profile to an authentication profile. Users using the authentication profile then can obtain authentication-free authorization information.
An authentication-free rule can be a common authentication-free rule or an authentication-free rule defined by an ACL. A common authentication-free rule is determined by parameters such as IP address, MAC address, interface, and VLAN. An authentication-free rule defined by an ACL is determined by the ACL rule (configured using the rule command). The destination IP address that users can access without authentication can be specified in both a common authentication-free rule and an authentication-free rule defined by an ACL. In addition, the destination domain name that users can access without authentication can be specified in an authentication-free rule defined by an ACL.
Compared with the authentication-free rule defined by IP address, the one defined by domain name is sometimes simple and convenient. For example, some authentication users who do not have an authentication account must first log in to the official website of a carrier and apply for a member account, or log in using the account of a third party such as Twitter or Facebook. This requires that the users can access specified websites before successful authentication. The domain name of a website is easier to remember than the IP address; therefore, the authentication-free rule defined by ACL can be configured to enable the users to access the domain names of websites without authentication.
If the user ACL is created using a name (specified by acl-name), a named ACL has been created and the ACL number (6000-6031) has been specified using the acl name acl-name acl-number command.
Run system-view
The system view is displayed.
Run free-rule-template name free-rule-template-name
An authentication-free rule profile is created and the authentication-free rule profile view is displayed.
By default, the device has a built-in authentication-free rule profile named default_free_rule.
Currently, the device supports only one authentication-free rule profile, that is, the built-in profile default_free_rule.
Configure an authentication-free rule.
Run free-rule rule-id { destination { any | ip { ip-address mask { mask-length | ip-mask } [ tcp destination-port port | udp destination-port port ] | any } } | source { any | { interface interface-type interface-number | ip { ip-address mask { mask-length | ip-mask } | any } | vlan vlan-id } * } } *
A common authentication-free rule is configured.
Run free-rule acl { acl-id | acl-name acl-name | ipv6 ipv6-acl-id }
An authentication-free rule defined by ACL is configured.
By default, no authentication-free rule is configured for NAC authentication users.
Run quit
Return to the system view.
Run authentication-profile name authentication-profile-name
The authentication profile view is displayed.
Run free-rule-template free-rule-template-name
The authentication-free rule profile is bound to the authentication profile.
By default, no authentication-free rule profile is bound to an authentication profile.
For wireless users, the configured authentication-free rule in an authentication-free rule profile takes effect only after the profile is bound to an authentication profile using the free-rule-template command in the authentication profile view.
For wired users, an authentication-free rule profile takes effect for all wired users after it is created in the system view. The authentication-free rule profile does not need to be bound to an authentication profile using the free-rule-template command in the authentication profile view.