242 Configuring Switch Information
www.dell.com | support.dell.com
MAC Address
— The supplicant MAC address.
Displaying the Authenticated Users Table
1
Open the
Authenticated Users
page.
2
Click
Show All
.
The
Authenticated Users Table
opens:
Figure 7-6. Authenticated Users Table
Displaying Authenticating Users Using the CLI Commands
The following table summarizes the equivalent CLI commands for authenticating users as
displayed in the
Authenticated Users
page.
The following is an example of the CLI commands:
Configuring Port Security
Network security can be increased by limiting access on a specific port only to users with specific
MAC addresses. The MAC addresses can be dynamically learned, up to that point, or they can be
statically configured. Locked port security monitors both received and learned packets that are
received on specific ports. Access to the locked port is limited to users with specific MAC addresses.
These addresses are either manually defined on the port, or learned on that port up to the point
when it is locked. When a packet is received on a locked port, and the packet’s source MAC address
is not tied to that port (either it was learned on a different port, or is unknown to the system), the
Table 7-3. Add User Name CLI Commands
CLI Command Description
show dot1x users
[username
username
]
Displays 802.1X users for the device.
Console# show dot1x users
Port Username Session Time Auth Method MAC Address
---- -------- ------------ ----------- -----------------
g12 bob 00:09:27 Remote 00:80:c8:b9:dc:1d