3com 8807 Guide De Référence

Page de 1099
802.1x Configuration Commands
301
interface-list cannot be input when the command is executed in Ethernet port 
view and it has effect only on the current interface.
Related command: display dot1x.
Example
# Configure the interface Ethernet 3/1/1 to be in unauthorized-force state.
[SW8800] dot1x port-control unauthorized-force interface ethernet 3/1/1 
dot1x port-method
Syntax
dot1x port-method { macbased | portbased } [ interface interface-list ]
undo dot1x port-method [ interface interface-list ]
View
System view, Ethernet interface view
Parameter
macbased: Configures the 802.1x authentication system to perform 
authentication on the supplicant based on MAC address.
portbased: Configures the 802.1x authentication system to perform 
authentication on the supplicant based on interface number.
interface interface-list: Ethernet interface list expressed in the format interface-list 
=interface-type interface-number
 [ to interface-type interface-number ] &<1-10>
interface-type means the interface type, interface-number is the interface number. 
Refer to command parameters in the "Port" section in the manual for the 
respective meanings and value ranges of them. The interface number after the key 
word to should be no smaller than the interface number before to&<1-10> in 
the command means that the preceding parameter can be entered up to 10 times.
Description
Use the dot1x port-method command to configure the base for 802.1x to 
perform access control on the specified interface.
Use the undo dot1x port-method command to restore the default access 
control base.
By default, the value is macbased.
This command is used to set the base for 802.1x to perform access control, 
namely authenticate the users, on the specified interface. When macbased is 
adopted, the user access this interface must be authenticated independently, and 
if one successful authentication user is to finish network service, the other 
accessed users can still use network service. When portbased is adopted, if only 
the first access user by this interface can be authenticated successfully, the other 
access users followed can be considered authenticated successfully automatically, 
but if the first one finish the network service, the other accessed users’ network 
service will be rejected.