C
HAPTER
23
| Authentication Commands
802.1X Port Authentication
– 867 –
C
OMMAND
U
SAGE
This command displays the following information:
◆
Global 802.1X Parameters
– Shows whether or not 802.1X port
authentication is globally enabled on the switch (
page 856
).
◆
Authenticator Parameters
– Shows whether or not EAPOL pass-through
is enabled (
page 856
).
◆
Supplicant Parameters
– Shows the supplicant user name used when
the switch responds to an MD5 challenge from an authenticator
(
page 863
).
◆
802.1X Port Summary
– Displays the port access control parameters
for each interface that has enabled 802.1X, including the following
items:
■
Type – Administrative state for port access control (Enabled,
Authenticator, or Supplicant).
■
Operation Mode – Allows single or multiple hosts (
page 858
).
■
Control Mode – Dot1x port control mode (
page 859
).
■
Authorized – Authorization status (yes or n/a - not authorized).
◆
802.1X Port Details
– Displays the port access control parameters for
each interface, including the following items:
■
Reauthentication – Periodic re-authentication (
page 860
).
■
Reauth Period – Time after which a connected client must be re-
authenticated (
page 861
).
■
Quiet Period – Time a port waits after Max Request Count is
exceeded before attempting to acquire a new client (
page 860
).
■
TX Period – Time a port waits during authentication session before
re-transmitting EAP packet (
page 862
).
■
Supplicant Timeout – Supplicant timeout.
■
Server Timeout – Server timeout. A RADIUS server must be set
before the correct operational value of 10 seconds will be displayed
in this field.
■
Reauth Max Retries – Maximum number of reauthentication
attempts.
■
Max Request – Maximum number of times a port will retransmit an
EAP request/identity packet to the client before it times out the
authentication session (
page 858
).
■
Operation Mode– Shows if single or multiple hosts (clients) can
connect to an 802.1X-authorized port.
■
Port Control–Shows the dot1x mode on a port as auto, force-
authorized, or force-unauthorized (
page 859
).
■
Intrusion Action– Shows the port response to intrusion when
authentication fails (
page 857
).
■
Supplicant– MAC address of authorized client.
Summary of Contents for ECS3510-10PD
Page 1: ...Management Guide www edge core com 10 Port Layer 2 Fast Ethernet Switch...
Page 2: ......
Page 4: ......
Page 48: ...CONTENTS 48...
Page 68: ...SECTION I Getting Started 68...
Page 78: ...CHAPTER 1 Introduction System Defaults 78...
Page 96: ...CHAPTER 2 Initial Switch Configuration Managing System Files 96...
Page 98: ...SECTION II Web Configuration 98...
Page 118: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 118...
Page 150: ...CHAPTER 4 Basic Management Tasks Resetting the System 150...
Page 196: ...CHAPTER 5 Interface Configuration VLAN Trunking 196 Figure 66 Configuring VLAN Trunking...
Page 238: ...CHAPTER 7 Address Table Settings Configuring MAC Address Mirroring 238...
Page 264: ...CHAPTER 8 Spanning Tree Algorithm Configuring Interface Settings for MSTP 264...
Page 274: ...CHAPTER 9 Congestion Control Automatic Traffic Control 274...
Page 288: ...CHAPTER 10 Class of Service Layer 3 4 Priority Settings 288...
Page 304: ...CHAPTER 11 Quality of Service Attaching a Policy Map to a Port 304...
Page 424: ...CHAPTER 13 Security Measures DHCP Snooping 424...
Page 568: ...CHAPTER 14 Basic Administration Protocols OAM Configuration 568...
Page 596: ...CHAPTER 15 IP Configuration Setting the Switch s IP Address IP Version 6 596...
Page 614: ...CHAPTER 1 IP Services Configuring the PPPoE Intermediate Agent 614...
Page 784: ...CHAPTER 20 System Management Commands Powered Device 784...
Page 814: ...CHAPTER 22 Remote Monitoring Commands 814...
Page 1008: ...CHAPTER 26 Interface Commands Power Savings 1008...
Page 1022: ...CHAPTER 27 Link Aggregation Commands Trunk Status Display Commands 1022...
Page 1052: ...CHAPTER 29 Congestion Control Commands Automatic Traffic Control Commands 1052...
Page 1064: ...CHAPTER 31 UniDirectional Link Detection Commands 1064...
Page 1070: ...CHAPTER 32 Address Table Commands 1070...
Page 1130: ...CHAPTER 34 ERPS Commands 1130...
Page 1172: ...CHAPTER 35 VLAN Commands Configuring Voice VLANs 1172...
Page 1186: ...CHAPTER 36 Class of Service Commands Priority Commands Layer 3 and 4 1186...
Page 1302: ...CHAPTER 38 Multicast Filtering Commands MVR for IPv6 1302...
Page 1368: ...CHAPTER 40 CFM Commands Delay Measure Operations 1368...
Page 1390: ...CHAPTER 42 Domain Name Service Commands 1390...
Page 1448: ...CHAPTER 44 IP Interface Commands ND Snooping 1448...
Page 1450: ...SECTION IV Appendices 1450...
Page 1455: ...APPENDIX A Software Specifications Management Information Bases 1455 UDP MIB RFC 2013...
Page 1456: ...APPENDIX A Software Specifications Management Information Bases 1456...
Page 1482: ...COMMAND LIST 1482...
Page 1493: ......