102 Update with your book title
Authenticating Users
The Authenticated Users
page
displays user port access lists. To open the Authenticated Users
page,
click Switch → Network Security → Authenticated Users.
Figure 7-5. Authenticated Users
•
User Name
— List of users authorized via the RADIUS Server.
•
Port
— The port number(s) used for authentication - per user name.
•
Session Time
— The amount of time the user was logged on to the device. The field format is
Day:Hour:Minute:Seconds
, for example, 3 days: 2 hours: 4 minutes: 39 seconds.
•
Authentication Method
— The method by which the last session was authenticated. The possible
field values are:
–
Remote
— The user was authenticated from a remote server.
–
None
— The user was not authenticated.
•
MAC Address
— The client (supplicant) MAC address.
Displaying the Authenticated Users Table
1
Open the
Add User Name
page.
2
Click
Show All
.
The
Authenticated Users Table
opens:
Figure 7-6. Authenticated Users Table