Siemens RUGGEDCOM ROX II User Manual page 180

Hide thumbs Also See for RUGGEDCOM ROX II:
Table of Contents

Advertisement

Chapter 6
Security
Parameter
max-request { max-request }
5.
If IEEE 802.1x standard authentication or IEEE 802.1x with MAC authentication is selected, configure a
primary and secondary RADIUS server. For more information, refer to
Authentication for Switched Ethernet
Type commit and press Enter to save the changes, or type revert and press Enter to abort.
6.
Section 6.6.3
Viewing the Security Status of Switched Ethernet Ports
To view the port security status of all switched Ethernet ports, type:
show interfaces switch slot port-security
Where slot is the name of the module location. For example:
ruggedcom# show interfaces switch lm1 port-security
SLOT
PORT
STATUS
----------------------
lm1
1
Unsecure
lm1
2
Unsecure
To view the port security status of a specific switched Ethernet port, type:
show interfaces switch slot port port-security
Where:
• slot is the name of the module location
• port is the port number (or a list of ports, if aggregated in a port trunk) for the module
For example:
show interfaces switch lm1 1 port-security
port-security
status Unsecure
Section 6.7
Managing User Authentication
This section describes the various methods for authenticating users.
CONTENTS
Section 6.7.1, "Setting the User Authentication Mode"
134
The period of time in seconds (s) the port will wait to receive the authentication server's
response to the client's request. If no response is received by the end of this period, the
authentication session fails.
Synopsis:   A 32-bit signed integer between 1 and 10
Default:   2
The maximum number of times the port will attempt to forward the authentication
server's request to the client. If none of these attempts are successful, the authentication
session fails.
Ports".
Viewing the Security Status of Switched Ethernet Ports
Description
Section 6.7.3.3, "Configuring RADIUS
RUGGEDCOM ROX II
CLI User Guide

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents