802.1x Configuration Commands
295
Total maximum 802.1x user resource number is 2048
Total current used 802.1x resource number is 0
Ethernet3/1/1 is link-down
802.1X protocol is disabled
Proxy trap checker is disabled
Proxy logoff checker is disabled
The port is a(n) authenticator
Authenticate Mode is auto
Port Control Type is Mac-based
Max on-line user number is 1024
... (Omitted)
dot1x
Syntax
dot1x
[
interface
interface-list
]
undo dot1x
[
interface
interface-list
]
Table 40
Description of 802.1x configuration information
Field
Description
Equipment 802.1X protocol is enabled
802.1X protocol is enabled on the switch.
CHAP authentication is enabled
CHAP authentication is enabled
DHCP-launch is disabled
If any user configures a static IP without
authorization in DHCP environment, the
switch will trigger authentication on the user.
Proxy trap checker is disabled
The system does not check the access of users
who log on through a proxy.
Proxy logoff checker is disabled
Transmit Period
Transmit interval timer
Handshake Period
The interval of sending handshake packets of
802.1x
Quiet Period
Quiet period set by Quiet timer
Quiet Period Timer is disable
Quiet Period Timer is disable
Supp Timeout
Timeout timer for Supplicant authentication
Server Timeout
Timeout timer for Authentication Server
The maximal retransmitting times
The maximal times for the Ethernet switch to
retransmit authentication request frames to
access user
Total maximum 802.1x user resource number The maximum number of access users allowed
Total current used 802.1x resource number
Number of access users currently on line
Ethernet3/1/1 is link-up
The state of Ethernet 2/1/1 is Up.
802.1X protocol is disabled
802.1X protocol is disabled on the port
Proxy trap checker is disabled
The port prohibits the access of users who log
on through a proxy
Proxy logoff checker is disabled
The port is a(n) authenticator
The port acts as authenticator
Authenticate Mode is auto
The authentication mode of the port is Auto
Port Control Type is Mac-based
The port control type is Mac-based, namely,
authentication of access users is implemented
based on the MAC address.
Max on-line user number
The maximum number of on-line users
...
Omitted
Summary of Contents for Switch 8807
Page 30: ......
Page 68: ...66 CHAPTER 2 COMMANDS USED TO LOG IN TO SWITCH ...
Page 78: ...76 CHAPTER 3 CONFIGURATION FILE MANAGEMENT COMMANDS ...
Page 96: ...94 CHAPTER 5 SUPER VLAN CONFIGURATION COMMANDS ...
Page 122: ...120 CHAPTER 8 IP PERFORMANCE CONFIGURATION COMMANDS ...
Page 130: ...128 CHAPTER 9 GARP GVRP CONFIGURATION COMMANDS ...
Page 162: ...160 CHAPTER 11 ETHERNET LINK AGGREGATION CONFIGURATION COMMANDS ...
Page 212: ...210 CHAPTER 13 MSTP CONFIGURATION COMMANDS ...
Page 234: ...232 CHAPTER 16 ACL COMMANDS ...
Page 282: ...280 CHAPTER 18 ACL CONTROL COMMANDS TO CONTROL LOGIN USERS ...
Page 293: ......
Page 294: ...292 CHAPTER 19 VLAN ACL CONFIGURATION COMMANDS ...
Page 310: ...308 CHAPTER 20 802 1X CONFIGURATION COMMANDS ...
Page 370: ...368 CHAPTER 21 AAA AND RADIUS HWTACACS PROTOCOL CONFIGURATION COMMANDS ...
Page 398: ...396 CHAPTER 23 STATIC ROUTE CONFIGURATION COMMANDS ...
Page 462: ...460 CHAPTER 25 OSPF CONFIGURATION COMMANDS ...
Page 498: ...496 CHAPTER 26 INTEGRATED IS IS CONFIGURATION COMMANDS ...
Page 548: ...546 CHAPTER 27 BGP CONFIGURATION COMMANDS ...
Page 570: ...568 CHAPTER 30 RECURSIVE ROUTING CONFIGURATION ...
Page 584: ...582 CHAPTER 32 MULTICAST VLAN CONFIGURATION COMMANDS ...
Page 600: ...598 CHAPTER 33 MULTICAST COMMON CONFIGURATION COMMANDS ...
Page 604: ...602 CHAPTER 34 STATIC MULTICAST MAC ADDRESS CONFIGURATION COMMAND ...
Page 656: ...654 CHAPTER 37 MSDP CONFIGURATION COMMANDS ...
Page 682: ...680 CHAPTER 38 MBGP MULTICAST EXTENSION CONFIGURATION COMMANDS ...
Page 762: ...760 CHAPTER 40 BGP MPLS VPN CONFIGURATION COMMANDS ...
Page 808: ...806 CHAPTER 44 HA CONFIGURATION COMMANDS_HA_CONFIGURATION ...
Page 820: ...818 CHAPTER 45 ARP CONFIGURATION COMMANDS ...
Page 824: ...822 CHAPTER 46 ARP TABLE SIZE CONFIGURATION COMMANDS max arp entry config of slot 13 8192 ...
Page 862: ...860 CHAPTER 47 DHCP CONFIGURATION COMMANDS ...
Page 870: ...868 CHAPTER 48 DNS CONFIGURATION COMMANDS ...
Page 972: ...970 CHAPTER 56 SSH TERMINAL SERVICE CONFIGURATION COMMANDS ...
Page 982: ...980 CHAPTER 57 FILE SYSTEM MANAGEMENT COMMANDS ...
Page 1026: ...1024 CHAPTER 60 INFORMATION CENTER ...
Page 1046: ...1044 CHAPTER 63 PORT PACKET STATISTICS COMMANDS ...
Page 1051: ...Ethernet Port Detection Configuration Commands 1049 ...
Page 1052: ...1050 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1053: ...Ethernet Port Detection Configuration Commands 1051 ...
Page 1054: ...1052 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1055: ......
Page 1056: ...1054 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1057: ......
Page 1058: ...1056 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1059: ...Ethernet Port Detection Configuration Commands 1057 ...
Page 1060: ...1058 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1061: ......
Page 1062: ...1060 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1063: ...Ethernet Port Detection Configuration Commands 1061 ...
Page 1064: ...1062 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1065: ......
Page 1066: ...1064 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1090: ...1088 CHAPTER 66 NQA CONFIGURATION COMMANDS ...