C
HAPTER
16
| IEEE 802.1X Commands
– 264 –
C
OMMAND
U
SAGE
The fields shown by this command are described below:
E
XAMPLE
Dot1x>configuration 1-10
Mode : Enabled
Reauthentication: Disabled
Period : 3600
Timeout : 30
Age Period : 300
Hold Time : 10
Port Admin State Port State Last Source Last ID
---- ------------ --------------------- ----------------- -------
1 Authorized Authorized - -
2 Authorized Authorized - -
3 Authorized Link Down - -
4 Authorized Authorized - -
5 Authorized Authorized - -
6 Authorized Link Down - -
7 Authorized Link Down - -
8 Authorized Link Down - -
9 Authorized Link Down - -
10 Authorized Link Down - -
Dot1x>
Table 28: 802.1X Configuration
Field
Description
Port
Port index
Admin State
Administrative state (Enabled or Disabled)
Port State
Operational state:
• Disabled - 802.1X and MAC-based authentication are globally
disabled.
• Link Down - 802.1X or MAC-based authentication is enabled, but
there is no link on the port.
• Authorized - The port is authorized. This state exists when 802.1X
authentication is enabled, the port has a link, the Admin State is
“802.1X,” and the supplicant is authenticated, or when the Admin
State is “Authorized.”
• Unauthorized - The port is unauthorized. This state exists when
802.1X authentication is enabled, the port has a link, and the
Admin State is “Auto,” but the supplicant is not (or not yet)
authenticated, or when the Admin State is “Unauthorized.”
• X Auth/Y Unauth - X clients are currently authorized and Y are
unauthorized. This state is shown when 802.1X and MAC-based
authentication is globally enabled and the Admin State is set to
“MAC-Based.”
Last Source
The source MAC address carried in the most recently received EAPOL
frame for port-based authentication, and the most recently received
frame from a new client for MAC-based authentication.
Last ID
The user name (supplicant identity) carried in the most recently
received Resp/ID EAPOL frame for port-based authentication, and
the source MAC address from the most recently received frame from
a new client for MAC-based authentication.
Summary of Contents for 8028L2
Page 1: ...MANAGEMENT GUIDE TigerSwitchTM 10 100 1000 28 Port Gigabit Ethernet Switch SMC8028L2 ...
Page 6: ...ABOUT THIS GUIDE 6 ...
Page 22: ...FIGURES 22 ...
Page 26: ...SECTION Getting Started 26 ...
Page 46: ...CHAPTER 2 Initial Switch Configuration Managing System Files 46 ...
Page 48: ...SECTION Web Configuration 48 ...
Page 144: ...CHAPTER 4 Configuring the Switch Configuring DHCP Relay and Option 82 Information 144 ...
Page 184: ...CHAPTER 6 Performing Basic Diagnostics Running Cable Diagnostics 184 ...
Page 238: ...CHAPTER 12 Port Commands 238 ...
Page 244: ...CHAPTER 13 Link Aggregation Commands 244 ...
Page 262: ...CHAPTER 15 RSTP Commands 262 ...
Page 272: ...CHAPTER 16 IEEE 802 1X Commands 272 ...
Page 282: ...CHAPTER 17 IGMP Commands 282 ...
Page 290: ...CHAPTER 18 LLDP Commands 290 ...
Page 296: ...CHAPTER 19 MAC Commands 296 ...
Page 306: ...CHAPTER 21 PVLAN Commands 306 ...
Page 318: ...CHAPTER 22 QoS Commands 318 ...
Page 352: ...CHAPTER 26 SNMP Commands 352 ...
Page 355: ...CHAPTER 27 HTTPS Commands 355 EXAMPLE HTTPS redirect enable HTTPS ...
Page 356: ...CHAPTER 27 HTTPS Commands 356 ...
Page 362: ...CHAPTER 29 UPnP Commands 362 ...
Page 370: ...CHAPTER 31 Firmware Commands 370 ...
Page 372: ...SECTION Appendices 372 ...
Page 386: ...GLOSSARY 386 ...
Page 391: ...INDEX 391 ...
Page 392: ...149100000079A R01 SMC8028L2 ...