After 802.1X authentication is enabled on an interface, a user device connected to the interface can access the network only after being authenticated. If authentication fails, the user device cannot access the network.
Interface-based access control: After the first user is authenticated, subsequent users can use network resources without being authenticated. If the first user goes offline, the other users can no longer access the network.
MAC-based access control: Every user accessing an interface is authenticated. If a user goes offline, other authenticated users can still access the network. If the client does not support 802.1x port authentication, MAC address bypass authentication can be used.
Authorized: authorized-force is configured to allow users to access the network without being authenticated.
Auto: auto is configured to allow only EAPOL packets to pass through and prohibit users from accessing network resources. If authentication succeeds, the interface enters the authorized state and allows users to access the network.
Unauthorized: unauthorized-force is configured to prohibit user authentication. The authenticator does not provide authentication services for access users on this interface.
If the access control type or authorization state of an interface is changed when users are accessing the network through this interface, the users may be logged off unexpectedly.
The system view is displayed.
The interface view is displayed.
802.1X authentication is enabled on the interface.
A forcible authentication domain is configured for 802.1X authentication on the interface.
The domain bound to the 802.1X authentication-enabled interface is the forcible authentication domain configured for 802.1X authentication on the interface using the dot1x force-domain command.
An access control type is configured on the interface.
An authorization mode is configured for 802.1X authentication on the interface.
The maximum number of access users allowed to access the 802.1X authentication-enabled interface is configured.
When the number of access users on an interface reaches the configured upper limit, no more users can access the network through this interface.