196
4.7.7.m.2. Unauthorized MAC Address Table
On the EAP-Request Configuration, pressing "U" opens the Unauthorized
MAC Address Table screen, as shown in Fig. 4-7-25-16. On this screen, you
can view the list of unauthorized MAC addresses to which EAP Requests are
to be transmitted.
Fig. 4-7-25-16 Unauthorized MAC Address Table
Screen Description
Age-Out Time
Displays the age-out time of the registered MAC address.
Display by
Displays the method of displaying the current unauthorized MAC
address.
MAC
Displays in the order of MAC address.
Port
Narrows down by arbitrary port number.
Selected Port
Displays the port number used when Display by is Port.
MAC Address
Displays the unauthorized MAC address.
Port
Displays the port number to which a supplicant with the
unauthorized MAC address is connected.
PN28240i Local Management System
802.1x Access Control Configuration -> Unauthorized MAC Address Table
Age-Out Time: 300 Sec. Display by:MAC Selected Port:
MAC Address Port
----------------- ----
-------------------------------- <COMMAND> -----------------------------------
[N]ext Page Display MAC Address by [M]AC
Pre[v]ious Page Display MAC Address by [P]ort
Set Age-Out [T]ime Add/Del Unauth MAC [A]ddress
[Q]uit to previous menu
Command>
Enter the character in square brackets to select option