8-48
Configuring Port-Based and Client-Based Access Control (802.1X)
Displaying 802.1X Configuration, Statistics, and Counters
show port-access authenticator
(Syntax Continued)
config
[[e] <
port-list
>]
S
hows:
• Whether port-access authenticator is active
• The 802.1X configuration of the ports configured as
802.1X authenticators
• Use
show running
to view the current
client-limit
configuration available for switches.
If you do not specify
<
port-list
>
, the command lists all
ports configured as 802.1X port-access authenticators.
Does not display data for a specified port that is not
enabled as an authenticator.
statistics [[e] <
port-list
>]
S
hows:
• Whether port-access authenticator is active
• The statistics of the ports configured as 802.1X
authenticators, including the supplicant’s MAC
address, as determined by the content of the last
EAPOL frame received on the port.
Does not display data for a specified port that is not
enabled as an authenticator.
session-counters [[e] <
port-list
>]
S
hows:
• Whether port-access authenticator is active
• The session status on the specified ports configured
as 802.1X authenticators
Also, for each port, the “User” column lists the user
name the supplicant included in its response packet.
(For the switch, this is the
identity
setting included in
the
supplicant
command—page 8-44.) Does not display
data for a specified port that is not enabled as an
authenticator.
vlan [<
port-list
>]
Shows per-port:
■
The Access Control setting
■
Unauth-VLAN ID (if any)
■
Auth-VLAN ID (if any)
Summary of Contents for ProCurve 2510-24
Page 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Page 2: ......
Page 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Page 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Page 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 316: ...8 Index ...
Page 317: ......