D-Link xStackTM DGS-3300 User Manual page 196

Xstack dgs/dxs-3300 series layer 3 stackable gigabit ethernet switch
Table of Contents

Advertisement

xStack DGS/DXS-3300 Series Layer 3 Stackable Gigabit Ethernet Switch CLI Manual
delete 802.1x user
Purpose
Syntax
Description
Parameters
Restrictions
Example Usage:
To delete 802.1x users:
DGS-3324SRi:4# delete 802.1x user dtremblett
Command: delete 802.1x user dtremblett
Success.
DGS-3324SRi:4#
show 802.1x auth_configuration
Purpose
Syntax
Description
Used to delete an 802.1x user account on the Switch.
delete 802.1x user <username 15>
The delete 802.1x user command is used to delete the 802.1x Port-
based or MAC-based Network Access control local users currently
configured on the Switch.
<username 15> − A username can be as many as 15 alphanumeric
characters.
Only administrator-level users can issue this command.
Used to display the current configuration of the 802.1x server on the
Switch.
show 802.1x auth_configuration {ports [<portlist> | all]}
The show 802.1x command is used to display the current configuration of
the 802.1x Port-based or MAC-based Network Access Control server
application on the Switch.
The following details what is displayed:
802.1x Enabled/Disabled − Shows the current status of 802.1x functions
on the Switch.
Authentication Mode: Displays the type of authentication mode of the
802.1x function on the Switch. This field may read Port_based or MAC-
based.
Authentication Protocol: Radius_Eap − Shows the authentication protocol
suite in use between the Switch and a RADIUS server.
Port number − Shows the physical port number on the Switch.
Capability: Authenticator/None − Shows the capability of 802.1x functions
on the port number displayed above. There are two 802.1x capabilities
that can be set on the Switch: Authenticator and None.
AdminCtlDir: Both/In − Shows whether a controlled Port that is
unauthorized will exert control over communication in both receiving and
transmitting directions, or just the receiving direction.
OpenCtlDir: Both/In − Shows whether a controlled Port that is
unauthorized will exert control over communication in both receiving and
transmitting directions, or just the receiving direction.
193

Advertisement

Table of Contents
loading

Table of Contents