User context refers to association information of a user, such as the user name, user VLAN, and access interface.
For example, on some enterprise networks, VLANs are used to divide the entire network into different areas with various security levels. The administrator requires that a user should obtain different network access rights when the user connects to the network from different areas. In this case, the user context identification function can be enabled on access devices, and a group of VLANs that belong to the same area are added to the same user context profile. The administrator then assigns the mapping network access rights to different user context profiles based on the security level of each area. When a user connects to the network from different areas, the user is added to different user context profiles matching their access VLANs and therefore obtains different network access rights.
The device can only identify user VLANs.
During 802.1X authentication, if the client does not respond, even if the user context profile is matched, 802.1X authentication cannot be triggered. In this case, the configured user context profile does not take effect.
The system view is displayed.
The user context identification function is enabled.
By default, the user context identification function is disabled.
Run access-context profile name profile-name
The user context profile is created and the user context profile view is displayed.
By default, no user context profile is created.
Run if-match vlan-id { start-vlan-id [ to end-vlan-id ] } &<1-10>
The VLAN ID-based user identification policy is configured.
By default, no VLAN ID-based user identification policy is configured.
Run quit
Return to the system view.
Run access-author policy name policy-name
The user authentication event authorization policy is created and the user authentication event authorization policy view is displayed.
By default, no user authentication event authorization policy is created.
Run match access-context-profile profile-name action { authen-fail service-scheme service-scheme-name | authen-server-down service-scheme service-scheme-name | authen-server-up re-authen | client-no-response service-scheme service-scheme-name | portal-server-down service-scheme service-scheme-name | portal-server-up re-authen | pre-authen service-scheme service-scheme-name } *
The network access rights are configured based on the user context profile for specified users in each phase before authentication success.
By default, no network access right is configured for specified users in each phase before authentication success.
The network access rights for users in each phase before authentication success are assigned using a service scheme. Therefore, before performing this operation, run the service-scheme command in the AAA view to create a service scheme.
Run match access-context-profile profile-name action access-domain domain-name [ dot1x | mac-authen | portal ] * [ force ], an access user's authentication domain is configured based on the user context profile.
By default, no access user's authentication domain is configured based on the user context profile.
Before performing this operation, run the domain command in the AAA view to create a domain.
Run quit
Return to the system view.
Run access-author policy policy-name global
The user authentication event authorization policy is applied.
By default, no user authentication event authorization policy is applied.