Chapter 8
| Authentication Commands
802.1X Port Authentication
– 289 –
Command Mode
Privileged Exec
Command Usage
This command displays the following information:
◆ Global 802.1X Parameters – Shows whether or not 802.1X port authentication is
globally enabled on the switch (page 278).
◆ Authenticator Parameters – Shows whether or not EAPOL pass-through is
enabled (page 278).
◆ Supplicant Parameters – Shows the supplicant user name used when the switch
responds to an MD5 challenge from an authenticator (page 285).
◆ 802.1X Port Summary – Displays the port access control parameters for each
interface that has enabled 802.1X, including the following items:
â–
Type – Administrative state for port access control (Enabled, Authenticator,
or Supplicant).
â–
Operation Mode – Allows single or multiple hosts (page 280).
â–
Control Mode – Dot1x port control mode (page 281).
â–
Authorized – Authorization status (yes or n/a - not authorized).
◆ 802.1X Port Details – Displays the port access control parameters for each
interface, including the following items:
â–
Reauthentication – Periodic re-authentication (page 282).
â–
Reauth Period – Time after which a connected client must be re-
authenticated (page 283).
â–
Quiet Period – Time a port waits after Max Request Count is exceeded
before attempting to acquire a new client (page 282).
â–
TX Period – Time a port waits during authentication session before re-
transmitting EAP packet (page 284).
â–
Supplicant Timeout – Supplicant timeout.
â–
Server Timeout – Server timeout. A RADIUS server must be set before the
correct operational value of 10 seconds will be displayed in this field.
â–
Reauth Max Retries – Maximum number of reauthentication attempts.
â–
Max Request – Maximum number of times a port will retransmit an EAP
request/identity packet to the client before it times out the authentication
session (page 280).
â–
Operation Mode– Shows if single or multiple hosts (clients) can connect to
an 802.1X-authorized port.
â–
Port Control–Shows the dot1x mode on a port as auto, force-authorized, or
force-unauthorized (page 281).
â–
Intrusion Action– Shows the port response to intrusion when
authentication fails (page 279).
â–
Supplicant– MAC address of authorized client.