Enabling strict-checking on portal authorization information

The strict checking mode allows a portal user to stay online only when the authorized information for the user is successfully deployed on the interface.

You can enable strict checking on authorized ACLs. If you enable ACL checking, the user will be logged out if either checking fails.

An ACL checking fails when the authorized ACL does not exist on the device or the ACL fails to be deployed.

To enable strict-checking on portal authorization information:

Step

Command

Remarks

1. Enter system view.

system-view

N/A

2. Enter interface view.

interface interface-type interface-number

N/A

3. Enable strict checking mode on portal authorization information.

portal authorization { acl | user-profile } strict-checking

By default, the strict checking mode is disabled. In this case, the portal users stay online even when the authorized ACLs do not exist or fail to be deployed.

The user-profile keyword is not supported in the current software version.