Host authentication – Dell PowerEdge VRTX User Manual

Page 243

Advertising
background image

243

FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Plasma\User

Guide\Plasma_UGSwitching_NetworkSecurity.fm

D E L L CO N F I D E N T I A L – P R E L I MI N A RY 4/ 1 8 /1 3 - F O R PR O O F O N LY

Monitoring Users Using the CLI Commands

The following table summarizes the CLI commands for monitoring users:

The following is an example of the CLI commands:

Host Authentication

Use the Host Authentication page to define the authentication mode on the

port, and the action to perform if a violation is detected.
To view ports and their authentication information:

1 Click Switching > Network Security > Dot1 Authentication > Host

Authentication to display the Host Authentication: Summary page.
A list of the ports and their authentication modes is displayed. The fields

are defined on the

Edit page with the exception of the following field:

Table 7-15. Monitoring Users CLI Commands

CLI Command

Description

show dot1x monitoring result

[username username]

Displays the captured information of each

interface/host on the switch.

console# show dot1x monitoring Tom

Username: Tom

Port g1

Quiet period: 60 Seconds

Tx period: 30 Seconds

Max req: 2

Supplicant timeout: 30 Seconds

Server timeout: 30 Seconds

Session Time (HH:MM:SS): 08:19:17

MAC Address: 00:08:78:32:98:78

Authentication Method: Remote

Assigned VLAN: 207

Reason for Failure:VLAN was not defined on Switch

Advertising