EasyManua.ls Logo

Cisco Sx350

Cisco Sx350
1323 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
802.1X Commands
Cisco Sx350 Ph. 2.2.5 Devices - Command Line Interface Reference Guide 118
3
The following describes the significant fields shown in the display:
PortThe port interface-id.
Host mode—The port authentication configured mode. Possible values:
single-host, multi-host, multi-sessions.
single-host
multi-host
multi-sessions
Authentication methods—Authentication methods configured on port. Possible
values are combinations of the following methods:
802.1x
mac
wba
Port Administrated statusThe port administration (configured) mode. Possible values:
force-auth, force-unauth, auto.
Port Operational statusThe port operational (actual) mode. Possible values: authorized or
unauthorized.
UsernameUsername representing the supplicant identity. This field shows the username if the
port control is auto. If the port is Authorized, it displays the username of the current user. If the port
is Unauthorized, it displays the last user authorized successfully.
Quiet periodNumber of seconds that the device remains in the quiet state following a failed
authentication exchange (for example, the client provided an invalid password).
Silence periodNumber of seconds that If an authorized client does not send traffic during the
silence period specified by the command, the state of the client is changed to unauthorized.
Tx periodNumber of seconds that the device waits for a response to an Extensible
Authentication Protocol (EAP) request/identity frame from the client before resending the request.
Max reqMaximum number of times that the device sends an EAP request frame (assuming that
no response is received) to the client before restarting the authentication process.
Server timeoutNumber of seconds that the device waits for a response from the authentication
server before resending the request.
Session TimeAmount of time (HH:MM:SS) that the user is logged in.
MAC addressSupplicant MAC address.

Table of Contents

Related product manuals