
C
HAPTER
16
| IEEE 802.1X Commands
– 268 –
C
OMMAND
U
SAGE
The fields shown by this command are described below:
E
XAMPLE
Dot1x>configuration 1-10
Mode : Enabled
Reauthentication: Disabled
Period : 3600
Timeout : 30
Age Period : 300
Hold Time : 10
Port Admin State Port State Last Source Last ID
---- ------------ --------------------- ----------------- -------
1 Authorized Authorized - -
2 Authorized Authorized - -
3 Authorized Link Down - -
4 Authorized Authorized - -
5 Authorized Authorized - -
6 Authorized Link Down - -
7 Authorized Link Down - -
8 Authorized Link Down - -
9 Authorized Link Down - -
10 Authorized Link Down - -
Dot1x>
Table 28: 802.1X Configuration
Field
Description
Port
Port index
Admin State
Administrative state (Enabled or Disabled)
Port State
Operational state:
• Disabled - 802.1X and MAC-based authentication are globally
disabled.
• Link Down - 802.1X or MAC-based authentication is enabled, but
there is no link on the port.
• Authorized - The port is authorized. This state exists when 802.1X
authentication is enabled, the port has a link, the Admin State is
“802.1X,” and the supplicant is authenticated, or when the Admin
State is “Authorized.”
• Unauthorized - The port is unauthorized. This state exists when
802.1X authentication is enabled, the port has a link, and the
Admin State is “Auto,” but the supplicant is not (or not yet)
authenticated, or when the Admin State is “Unauthorized.”
• X Auth/Y Unauth - X clients are currently authorized and Y are
unauthorized. This state is shown when 802.1X and MAC-based
authentication is globally enabled and the Admin State is set to
“MAC-Based.”
Last Source
The source MAC address carried in the most recently received EAPOL
frame for port-based authentication, and the most recently received
frame from a new client for MAC-based authentication.
Last ID
The user name (supplicant identity) carried in the most recently
received Resp/ID EAPOL frame for port-based authentication, and
the source MAC address from the most recently received frame from
a new client for MAC-based authentication.
Summary of Contents for ES4528V-38
Page 1: ...Management Guide www edge core com 28 Port Gigabit Ethernet Switch...
Page 2: ......
Page 4: ......
Page 6: ...ABOUT THIS GUIDE 6...
Page 22: ...FIGURES 22...
Page 26: ...SECTION Getting Started 26...
Page 46: ...CHAPTER 2 Initial Switch Configuration Managing System Files 46...
Page 48: ...SECTION Web Configuration 48...
Page 75: ...CHAPTER 4 Configuring the Switch Creating Trunk Groups 75 Figure 11 LACP Port Configuration...
Page 186: ...CHAPTER 6 Performing Basic Diagnostics Running Cable Diagnostics 186...
Page 192: ...CHAPTER 7 Performing System Maintenance Managing Configuration Files 192...
Page 242: ...CHAPTER 12 Port Commands 242...
Page 248: ...CHAPTER 13 Link Aggregation Commands 248...
Page 266: ...CHAPTER 15 RSTP Commands 266...
Page 276: ...CHAPTER 16 IEEE 802 1X Commands 276...
Page 286: ...CHAPTER 17 IGMP Commands 286...
Page 294: ...CHAPTER 18 LLDP Commands 294...
Page 300: ...CHAPTER 19 MAC Commands 300...
Page 310: ...CHAPTER 21 PVLAN Commands 310...
Page 322: ...CHAPTER 22 QoS Commands 322...
Page 356: ...CHAPTER 26 SNMP Commands 356...
Page 359: ...CHAPTER 27 HTTPS Commands 359 EXAMPLE HTTPS redirect enable HTTPS...
Page 360: ...CHAPTER 27 HTTPS Commands 360...
Page 366: ...CHAPTER 29 UPnP Commands 366...
Page 374: ...CHAPTER 31 Firmware Commands 374...
Page 376: ...SECTION Appendices 376...
Page 390: ...GLOSSARY 390...
Page 395: ......