
Chapter 8
| Authentication Commands
802.1X Port Authentication
– 265 –
Information Display Commands
show dot1x
This command shows general port authentication related settings on the switch or
a specific interface.
Syntax
show dot1x
[
statistics
] [
interface
interface
]
statistics
- Displays dot1x status for each port.
interface
ethernet
unit
/
port
unit
- Unit identifier. (Range: 1)
port
- Port number. (Range: 1-28/52)
Command Mode
Privileged Exec
Command Usage
This command displays the following information:
◆
Global 802.1X Parameters
– Shows whether or not 802.1X port authentication is
globally enabled on the switch (
).
◆
Authenticator Parameters
– Shows whether or not EAPOL pass-through is
◆
802.1X Port Summary
– Displays the port access control parameters for each
interface that has enabled 802.1X, including the following items:
■
Type – Administrative state for port access control (Enabled, Authenticator,
or Supplicant).
■
Operation Mode–Allows single or multiple hosts (
).
■
Control Mode – Dot1x port control mode (
■
Authorized– Authorization status (yes or n/a - not authorized).
◆
802.1X Port Details
– Displays the port access control parameters for each
interface, including the following items:
■
Reauthentication – Periodic re-authentication (
).
■
Reauth Period – Time after which a connected client must be re-
authenticated (
).
■
Quiet Period – Time a port waits after Max Request Count is exceeded
before attempting to acquire a new client (
).
■
TX Period – Time a port waits during authentication session before re-
transmitting EAP packet (
■
Supplicant Timeout – Supplicant timeout.
■
Server Timeout – Server timeout. A RADIUS server must be set before the
correct operational value of 10 seconds will be displayed in this field.
■
Reauth Max Retries – Maximum number of reauthentication attempts.
Summary of Contents for ECS4120-28F
Page 36: ...Contents 36...
Page 38: ...Figures 38...
Page 46: ...Section I Getting Started 46...
Page 70: ...Chapter 1 Initial Switch Configuration Setting the System Clock 70...
Page 86: ...Chapter 2 Using the Command Line Interface CLI Command Groups 86...
Page 202: ...Chapter 5 SNMP Commands Additional Trap Commands 202...
Page 210: ...Chapter 6 Remote Monitoring Commands 210...
Page 216: ...Chapter 7 Flow Sampling Commands 216...
Page 278: ...Chapter 8 Authentication Commands PPPoE Intermediate Agent 278...
Page 360: ...Chapter 9 General Security Measures Port based Traffic Segmentation 360...
Page 384: ...Chapter 10 Access Control Lists ACL Information 384...
Page 424: ...Chapter 11 Interface Commands Power Savings 424...
Page 446: ...Chapter 13 Power over Ethernet Commands 446...
Page 456: ...Chapter 14 Port Mirroring Commands RSPAN Mirroring Commands 456...
Page 488: ...Chapter 17 UniDirectional Link Detection Commands 488...
Page 494: ...Chapter 18 Address Table Commands 494...
Page 554: ...Chapter 20 ERPS Commands 554...
Page 620: ...Chapter 22 Class of Service Commands Priority Commands Layer 3 and 4 620...
Page 638: ...Chapter 23 Quality of Service Commands 638...
Page 772: ...Chapter 25 LLDP Commands 772...
Page 814: ...Chapter 26 CFM Commands Delay Measure Operations 814...
Page 836: ...Chapter 28 Domain Name Service Commands 836...
Page 848: ...Chapter 29 DHCP Commands DHCP Relay Option 82 848...
Page 902: ...Section III Appendices 902...
Page 916: ...Glossary 916...
Page 926: ...CLI Commands 926...
Page 937: ......
Page 938: ...E092017 CS R02...