Monitoring users – Dell PowerEdge VRTX User Manual
Page 241

241
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Plasma\User
Guide\Plasma_UGSwitching_NetworkSecurity.fm
D E L L CO N F I D E N T I A L – P R E L I MI N A RY 4/ 1 8 /1 3 - F O R PR O O F O N LY
The following is an example of the CLI commands:
Monitoring Users
Use the Monitoring Users page to view rejected users.
1 Click Switching > Network Security > Dot1 Authentication >
Monitoring Users to display the Monitoring Users page.
2 Select a supplicant that was authenticated on the port. The supplicant’s
information is displayed.
–
User Name — Name assigned to this port.
–
Port — Number of port.
–
VLAN — Port belongs to this VLAN.
–
MAC Address — Source of traffic.
console(config)# aaa authentication dot1x default none
console(config)# interface vlan 5
console(config-if)# dot1x auth-not-req
console(config)# vlan database
console(config-vlan)# vlan 2
console(config-vlan)# exit
console(config)# interface vlan 2
console(config-if)# dot1x guest-vlan
console# show dot1x
Interface
Admin
Mode
Oper Mode
Reauth
Control
Reauth
Period
Username
--------
-------
----------
--------
------
--------
gi0/1
Auto
Authorized
Enabled
3600
Bob
gi0/2
Auto
Authorized
Enabled
3600
John
gi0/3
Auto
Unauthoriz
ed
Enabled
3600
Clark
gi0/4
Force-
auth
Authorized
Disabled
3600
n/a