
C
HAPTER
5
| Monitoring the Switch
Displaying Port Security Information
– 171 –
◆
Last Source
- The source MAC address carried in the most recently
received EAPOL frame for port-based authentication, and the most
recently received frame from a new client for MAC-based
authentication.
◆
Last ID
- The user name (supplicant identity) carried in the most
recently received Resp/ID EAPOL frame for port-based authentication,
and the source MAC address from the most recently received frame
from a new client for MAC-based authentication.
W
EB
I
NTERFACE
To display the authentication state and related information for each port,
click Monitor, Port Security, Status.
Figure 58: Port Security Status
D
ISPLAYING
P
ORT
S
ECURITY
S
TATISTICS
Use the Port Security Statistics page to display IEEE 802.1X statistics and
protocol information for each port. It provides detailed IEEE 802.1X
statistics for a specific switch port running port-based authentication. For
MAC-based ports, it shows only selected backend server (RADIUS
Authentication Server) statistics.
P
ARAMETERS
These parameters are displayed on the 802.1X Statistics page:
◆
Port
- Port Identifier.
Receive EAPOL Counters
◆
Total
- The number of valid EAPOL frames of any type that have been
received by the switch.
◆
Response ID
- The number of valid EAP Resp/ID frames that have
been received by the switch.
◆
Responses
- The number of valid EAPOL response frames (other than
Resp/ID frames) that have been received by the switch.
Summary of Contents for ES4528V-38
Page 1: ...Management Guide www edge core com 28 Port Gigabit Ethernet Switch...
Page 2: ......
Page 4: ......
Page 6: ...ABOUT THIS GUIDE 6...
Page 22: ...FIGURES 22...
Page 26: ...SECTION Getting Started 26...
Page 46: ...CHAPTER 2 Initial Switch Configuration Managing System Files 46...
Page 48: ...SECTION Web Configuration 48...
Page 75: ...CHAPTER 4 Configuring the Switch Creating Trunk Groups 75 Figure 11 LACP Port Configuration...
Page 186: ...CHAPTER 6 Performing Basic Diagnostics Running Cable Diagnostics 186...
Page 192: ...CHAPTER 7 Performing System Maintenance Managing Configuration Files 192...
Page 242: ...CHAPTER 12 Port Commands 242...
Page 248: ...CHAPTER 13 Link Aggregation Commands 248...
Page 266: ...CHAPTER 15 RSTP Commands 266...
Page 276: ...CHAPTER 16 IEEE 802 1X Commands 276...
Page 286: ...CHAPTER 17 IGMP Commands 286...
Page 294: ...CHAPTER 18 LLDP Commands 294...
Page 300: ...CHAPTER 19 MAC Commands 300...
Page 310: ...CHAPTER 21 PVLAN Commands 310...
Page 322: ...CHAPTER 22 QoS Commands 322...
Page 356: ...CHAPTER 26 SNMP Commands 356...
Page 359: ...CHAPTER 27 HTTPS Commands 359 EXAMPLE HTTPS redirect enable HTTPS...
Page 360: ...CHAPTER 27 HTTPS Commands 360...
Page 366: ...CHAPTER 29 UPnP Commands 366...
Page 374: ...CHAPTER 31 Firmware Commands 374...
Page 376: ...SECTION Appendices 376...
Page 390: ...GLOSSARY 390...
Page 395: ......