EasyManuals Logo

Edge-Core ECS4620-28T User Manual

Edge-Core ECS4620-28T
2143 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #1119 background imageLoading...
Page #1119 background image
Chapter 8
| Authentication Commands
802.1X Port Authentication
– 289 –
Command Mode
Privileged Exec
Command Usage
This command displays the following information:
◆ Global 802.1X Parameters – Shows whether or not 802.1X port authentication is
globally enabled on the switch (page 278).
◆ Authenticator Parameters – Shows whether or not EAPOL pass-through is
enabled (page 278).
◆ Supplicant Parameters – Shows the supplicant user name used when the switch
responds to an MD5 challenge from an authenticator (page 285).
◆ 802.1X Port Summary – Displays the port access control parameters for each
interface that has enabled 802.1X, including the following items:
â– 
Type – Administrative state for port access control (Enabled, Authenticator,
or Supplicant).
â– 
Operation Mode – Allows single or multiple hosts (page 280).
â– 
Control Mode – Dot1x port control mode (page 281).
â– 
Authorized – Authorization status (yes or n/a - not authorized).
◆ 802.1X Port Details – Displays the port access control parameters for each
interface, including the following items:
â– 
Reauthentication – Periodic re-authentication (page 282).
â– 
Reauth Period – Time after which a connected client must be re-
authenticated (page 283).
â– 
Quiet Period – Time a port waits after Max Request Count is exceeded
before attempting to acquire a new client (page 282).
â– 
TX Period – Time a port waits during authentication session before re-
transmitting EAP packet (page 284).
â– 
Supplicant Timeout – Supplicant timeout.
â– 
Server Timeout – Server timeout. A RADIUS server must be set before the
correct operational value of 10 seconds will be displayed in this field.
â– 
Reauth Max Retries – Maximum number of reauthentication attempts.
â– 
Max Request – Maximum number of times a port will retransmit an EAP
request/identity packet to the client before it times out the authentication
session (page 280).
â– 
Operation Mode– Shows if single or multiple hosts (clients) can connect to
an 802.1X-authorized port.
â– 
Port Control–Shows the dot1x mode on a port as auto, force-authorized, or
force-unauthorized (page 281).
â– 
Intrusion Action– Shows the port response to intrusion when
authentication fails (page 279).
â– 
Supplicant– MAC address of authorized client.

Table of Contents

Other manuals for Edge-Core ECS4620-28T

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Edge-Core ECS4620-28T and is the answer not in the manual?

Edge-Core ECS4620-28T Specifications

General IconGeneral
BrandEdge-Core
ModelECS4620-28T
CategorySwitch
LanguageEnglish

Related product manuals