632
C
HAPTER
A: T
ROUBLESHOOTING
A
WX S
WITCH
Tracing Authorization Activity
Tracing authorization activity can help diagnose authorization problems.
For example, to trace the authorization of MAC address
00:00:30:b8:72:b0, type the following command:
WX1200#
set trace authorization mac-addr 00:00:30:b8:72:b0
success: change accepted.
Tracing 802.1X Sessions
Tracing 802.1X sessions can help diagnose problems with wireless clients.
For example, to trace 802.1X activity for user [email protected] at
level 4, type the following command:
WX1200#
set trace dot1x user [email protected] level 4
success: change accepted.
Displaying a Trace
Use the
display trace
command to display the trace areas that are
enabled. For example, to display all currently running trace commands,
type the following command:
WX1200#
display trace
milliseconds spent printing traces: 31.945
Trace Area
Level Mac
User
Port Filter
-------------------- ----- ----------------- ----------------- ---- --------
authentication
3
admin
0
authorization
5
0
sm
5
1
0
dot1x 2
0
Stopping a Trace
The
clear trace
commands deletes running trace commands. To clear all
traces or a particular trace area, type the following command:
clear trace
{
all
|
trace
area
}
(For a list of all areas that can be traced, see “List of Trace Areas” on
page 634.)
For example, to stop a trace of session manager activity, type the
following command:
WX1200#
clear trace sm
success: change accepted.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...