13-55
Configuring Port-Based and User-Based Access Control (802.1X)
Displaying 802.1X Configuration, Statistics, and Counters
Displaying 802.1X Configuration,
Statistics, and Counters
Show Commands for Port-Access Authenticator
802.1X Authentication Commands
802.1X Supplicant Commands
802.1X Open VLAN Mode Commands
802.1X-Related Show Commands
show port-access authenticator
show port-access authenticator config
show port-access authenticator statistics
page 13-59
show port-access authenticator session-counters
page 13-60
show port-access authenticator vlan
show port-access authenticator clients
show port-access authenticator clients <
port-list
> detailed page 13-63
show port-access supplicant
Details of 802.1X Mode Status Listings
RADIUS server configuration
Syntax:
show port-access authenticator [
port-list
]
[config | statistics | session-counters | vlan | clients [detailed]]
If you enter the
show port-access authenticator
command with-
out an optional value, the following configuration informa-
tion is displayed for all switch ports, or specified ports, that
are enabled for 802.1X port-access authentication:
•
Port -access authenticator activated
: Are any switch ports
configured to operate as 802.1X authenticators using the
aaa port-access authenticator
command?
Yes
or
No
•
Allow RADIUS-assigned dynamic (GVRP) VLANs
: Are RADIUS-
assigned dynamic (GVRP-learned) VLANs supported for
authenticated and unauthenticated client sessions on the
switch?
Yes
or
No
•
Auth Clients
: Number of authorized clients
•
Unauth Clients
: Number of unauthorized clients
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......