A
UTHENTICATION
C
OMMANDS
4-111
Command Mode
Privileged Exec
Command Usage
This command displays the following information:
•
Global 802.1X Parameters
– Shows whether or not 802.1X port
authentication is globally enabled on the switch.
•
802.1X Port Summary
– Displays the port access control parameters
for each interface that has enabled 802.1X, including the following
items:
- Status– Administrative state for port access control.
- Operation Mode–Allows single or multiple hosts (page 4-107).
- Mode– Dot1x port control mode (page 4-106).
- Authorized– Authorization status (yes or n/a - not authorized).
•
802.1X Port Details
– Displays the port access control parameters
for each interface, including the following items:
- reauth-enabled – Periodic re-authentication (page 4-108).
- reauth-period – Time after which a connected client must be
re-authenticated (page 4-109).
- quiet-period – Time a port waits after Max Request Count is
exceeded before attempting to acquire a new client (page 4-109).
- tx-period – Time a port waits during authentication session
before re-transmitting EAP packet (page 4-110).
- supplicant-timeout – Supplicant timeout.
- server-timeout – Server timeout.
- reauth-max – Maximum number of reauthentication attempts.
- max-req – Maximum number of times a port will retransmit an
EAP request/identity packet to the client before it times out the
authentication session (page 4-106).
- Status – Authorization status (authorized or not).
- Operation Mode – Shows if single or multiple hosts (clients) can
connect to an 802.1X-authorized port.
- Max Count – The maximum number of hosts allowed to access
this port (page 4-107).
- Port-control –Shows the dot1x mode on a port as auto,
force-authorized, or force-unauthorized (page 4-106).
- Supplicant – MAC address of authorized client.
- Current Identifier – The integer (0-255) used by the
Authenticator to identify the current authentication session.
Summary of Contents for 6128L2
Page 2: ......
Page 21: ...CONTENTS xvii Glossary Index ...
Page 22: ...CONTENTS xviii ...
Page 26: ...TABLES xxii ...
Page 40: ...INTRODUCTION 1 10 ...
Page 54: ...INITIAL CONFIGURATION 2 14 ...
Page 193: ...PORT CONFIGURATION 3 139 Figure 3 61 Displaying Etherlike and RMON Statistics ...
Page 257: ...QUALITY OF SERVICE 3 203 Figure 3 90 Configuring Policy Maps ...
Page 313: ...COMMAND GROUPS 4 13 PE Privileged Exec VC VLAN Database Configuration ...
Page 592: ...TROUBLESHOOTING B 4 ...
Page 605: ......