HPE FlexNetwork HSR6800 Security Command Reference page 121

Hide thumbs Also See for FlexNetwork HSR6800:
Table of Contents

Advertisement

Field
Proxy trap checker is disabled
Proxy logoff checker is disabled
EAD quick deploy is enabled
Transmit Period
Handshake Period
Reauth Period
Quiet Period
Quiet Period Timer is disabled
Supp Timeout
Server Timeout
The maximal retransmitting times
EAD quick deploy configuration
URL
Free IP
EAD timeout
The maximum 802.1X user resource
number per slot
Total current used 802.1X resource number
GigabitEthernet3/0/1 is link-up
802.1X protocol is disabled
Proxy trap checker is disabled
Proxy logoff checker is disabled
Handshake is disabled
Handshake secure is disabled
802.1X unicast-trigger is disabled
Periodic reauthentication is disabled
The port is an authenticator
Authenticate Mode is Auto
Port Control Type is Port-based
802.1X Multicast-trigger is enabled
Mandatory authentication domain
Description
Whether the device sends a trap when detecting that a user
is accessing the network through a proxy.
Whether the device logs off the user when detecting that the
user is accessing the network through a proxy.
Whether EAD fast deployment is enabled.
Username request timeout timer in seconds.
Handshake timer in seconds.
Periodic online user re-authentication timer in seconds.
Quiet timer in seconds.
Status of the quiet timer. In this example, the quiet timer is
enabled.
Client timeout timer in seconds.
Server timeout timer in seconds.
Maximum number of attempts for sending an authentication
request to a client.
EAD fast deployment configuration.
Redirect URL for unauthenticated users using a Web
browser to access the network.
Freely accessible network segment.
EAD rule timer in minutes.
Maximum number of concurrent 802.1X user per card.
Total number of online 802.1X users.
Status of the port. In this example, GigabitEthernet 3/0/1 is
up.
Whether 802.1X is enabled on the port.
Whether the port sends a trap when detecting that a user is
accessing the network through a proxy.
Whether the port logs off the user when detecting the user is
accessing the networking through a proxy.
Whether handshake is enabled on the port.
Whether handshake security is enabled on the port.
Whether unicast trigger is enabled on the port.
Whether periodic online user re-authentication is enabled on
the port.
Role of the port.
Authorization state of the port.
Access control method of the port.
Whether the 802.1X multicast-trigger function is enabled.
Mandatory authentication domain on the port.
108

Advertisement

Table of Contents
loading

Table of Contents