EasyManuals Logo

Edge-Core ECS3510-28T User Manual

Edge-Core ECS3510-28T
1474 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #853 background imageLoading...
Page #853 background image
C
HAPTER
23
| Authentication Commands
802.1X Port Authentication
– 853 –
COMMAND USAGE
This command displays the following information:
◆ Global 802.1X Parameters – Shows whether or not 802.1X port
authentication is globally enabled on the switch (page 842).
◆ Authenticator Parameters – Shows whether or not EAPOL pass-through
is enabled (page 842).
◆ Supplicant Parameters – Shows the supplicant user name used when
the switch responds to an MD5 challenge from an authenticator
(page 849).
◆ 802.1X Port Summary – Displays the port access control parameters
for each interface that has enabled 802.1X, including the following
items:
â– 
Type – Administrative state for port access control (Enabled,
Authenticator, or Supplicant).
â– 
Operation Mode – Allows single or multiple hosts (page 844).
â– 
Control Mode – Dot1x port control mode (page 845).
â– 
Authorized – Authorization status (yes or n/a - not authorized).
◆ 802.1X Port Details – Displays the port access control parameters for
each interface, including the following items:
â– 
Reauthentication – Periodic re-authentication (page 846).
â– 
Reauth Period – Time after which a connected client must be re-
authenticated (page 847).
â– 
Quiet Period – Time a port waits after Max Request Count is
exceeded before attempting to acquire a new client (page 846).
â– 
TX Period – Time a port waits during authentication session before
re-transmitting EAP packet (page 848).
â– 
Supplicant Timeout – Supplicant timeout.
â– 
Server Timeout – Server timeout. A RADIUS server must be set
before the correct operational value of 10 seconds will be displayed
in this field.
â– 
Reauth Max Retries – Maximum number of reauthentication
attempts.
â– 
Max Request – Maximum number of times a port will retransmit an
EAP request/identity packet to the client before it times out the
authentication session (page 844).
â– 
Operation Mode– Shows if single or multiple hosts (clients) can
connect to an 802.1X-authorized port.
â– 
Port Control–Shows the dot1x mode on a port as auto, force-
authorized, or force-unauthorized (page 845).
â– 
Intrusion Action– Shows the port response to intrusion when
authentication fails (page 843).
â– 
Supplicant– MAC address of authorized client.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Edge-Core ECS3510-28T and is the answer not in the manual?

Edge-Core ECS3510-28T Specifications

General IconGeneral
BrandEdge-Core
ModelECS3510-28T
CategoryNetwork Router
LanguageEnglish

Related product manuals