ProCurve 2610 Manual page 377

2610 / 2610-pwr series
Table of Contents

Advertisement

ProCurve(config)# show port-access authenticator config
Port Access Authenticator Configuration
Port-access authenticator activated [No] : No
| Re-auth Access
Port | Period
---- + ------- -------- ----- ------- -------- ---------- -------- -----
1
| No
2
| No
Figure 11-9. Example of show port-access authenticator config Command
Table 11-2. Field Descriptions of show port-access authenticator config Command Output (Figure 11-9)
Field
Port-access
authenticator activated
Port
Re-auth Period
Access Control
Max reqs
Quiet Period
TX Timeout
Suppliant Timeout
Server Timeout
Cntrl Dir
Max
Quiet
Control
Reqs
Period
Auto
2
60
Auto
2
60
Description
Whether 802.1X authentication is enabled or disabled on specified port(s).
Port number on switch.
Period of time (in seconds) after which clients connected to the port need to be re-
authenticated.
Port's authentication mode:
Auto: Network access is allowed to any connected device that supports 802.1X authentication
and provides valid 802.1X credentials.
Authorized: Network access is allowed to any device connected to the port, regardless of
whether it meets 802.1X criteria.
Unauthorized: Network access is blocked to any device connected to the port, regardless of
whether the device meets 802.1X criteria.
Number of authentication attempts that must time-out before authentication fails and the
authentication session ends.
Period of time (in seconds) during which the port does not try to acquire a supplicant.
Period of time (in seconds) that the port waits to retransmit the next EAPOL PDU during an
authentication session.
Period of time (in seconds) that the switch waits for a supplicant response to an EAP request.
Period of time (in seconds) that the switch waits for a server response to an authentication
request.
Directions in which flow of incoming and outgoing traffic is blocked on 802.1X-aware port that
has not yet entered the authenticated state:
Both: Incoming and outgoing traffic is blocked on port until authentication occurs.
In: Only incoming traffic is blocked on port before authentication occurs. Outgoing traffic with
unknown destination addresses is flooded on the unauthenticated 802.1X-aware port.
Configuring Port-Based and User-Based Access Control (802.1X)
Displaying 802.1X Configuration, Statistics, and Counters
TX
Supplicant Server
Timeout
Timeout
30
30
30
30
Cntrl
Timeout
Dir
30
both
30
in
11-53

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the 2610 and is the answer not in the manual?

Questions and answers

Table of Contents