Host authentication – Dell PowerEdge VRTX User Manual
Page 243

243
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Plasma\User
Guide\Plasma_UGSwitching_NetworkSecurity.fm
D E L L CO N F I D E N T I A L – P R E L I MI N A RY 4/ 1 8 /1 3 - F O R PR O O F O N LY
Monitoring Users Using the CLI Commands
The following table summarizes the CLI commands for monitoring users:
The following is an example of the CLI commands:
Host Authentication
Use the Host Authentication page to define the authentication mode on the
port, and the action to perform if a violation is detected.
To view ports and their authentication information:
1 Click Switching > Network Security > Dot1 Authentication > Host
Authentication to display the Host Authentication: Summary page.
A list of the ports and their authentication modes is displayed. The fields
are defined on the
Edit page with the exception of the following field:
Table 7-15. Monitoring Users CLI Commands
CLI Command
Description
show dot1x monitoring result
[username username]
Displays the captured information of each
interface/host on the switch.
console# show dot1x monitoring Tom
Username: Tom
Port g1
Quiet period: 60 Seconds
Tx period: 30 Seconds
Max req: 2
Supplicant timeout: 30 Seconds
Server timeout: 30 Seconds
Session Time (HH:MM:SS): 08:19:17
MAC Address: 00:08:78:32:98:78
Authentication Method: Remote
Assigned VLAN: 207
Reason for Failure:VLAN was not defined on Switch