Dell 6024 Switch User Manual


 
Configuring Switch Information 241
The following is an example of the CLI Command.
Authenticating Users
The
Authenticated Users
page
displays user port access lists.
To open the
Authenticated Users
page,
click
Switch
Network Security
Authenticated Users
.
Figure 7-5. Authenticated Users
The
Authenticated Users
page contains the following fields:
User Name
— List of users authorized via the RADIUS Server.
Port
— Lists the port numbers used for authentication. The ports are listed by user name.
Session Time
— The amount of time the user was logged on to the device. The field format is
Day:Hour:Minute:Seconds
, for example, 3 days: 2 hours: 4 minutes: 39 seconds.
Authentication Method
— The method by which the last session was authenticated. The possible
field values are:
Remote
— The user was authenticated from a remote server.
None
— The user was not authenticated.
dot1x single-host-
violation {forward
|discard |discard-
shutdown}[trap
seconds
]
Configures the action to be taken when a station,
whose MAC address is not the client (supplicant)
MAC address, attempts to access the interface.
Console(config)# interface ethernet g11
Console(config-if)# dot1x multiple-hosts
Table 7-2. Multiple Hosts CLI Commands
CLI Command Description