
8-49
Configuring Port-Based and Client-Based Access Control (802.1X)
Displaying 802.1X Configuration, Statistics, and Counters
Figure 8-7. Example of show port-access authenticator config Command
Table 8-2. Field Descriptions of show port-access authenticator config Command Output (Figure 8-7)
Field Description
Port-access
authenticator activated
Whether 802.1X authentication is enabled or disabled on specified port(s).
Port Port number on switch.
Re-auth Period Period of time (in seconds) after which clients connected to the port need to be re-
authenticated.
Access Control Port’s authentication mode:
Auto: Network access is allowed to any connected device that supports 802.1X authentication
and provides valid 802.1X credentials.
Authorized: Network access is allowed to any device connected to the port, regardless of
whether it meets 802.1X criteria.
Unauthorized: Network access is blocked to any device connected to the port, regardless of
whether the device meets 802.1X criteria.
Max reqs Number of authentication attempts that must time-out before authentication fails and the
authentication session ends.
Quiet Period Period of time (in seconds) during which the port does not try to acquire a supplicant.
TX Timeout Period of time (in seconds) that the port waits to retransmit the next EAPOL PDU during an
authentication session.
Supplicant Timeout Period of time (in seconds) that the switch waits for a supplicant response to an EAP request.
Server Timeout Period of time (in seconds) that the switch waits for a server response to an authentication
request.
ProCurve(config)# show port-access authenticator config
Port Access Authenticator Configuration
Port-access authenticator activated [No] : No
| Re-auth Access Max Quiet TX Supplicant Server
Port | Period Control Reqs Period Timeout Timeout Timeout
---- + ------- -------- ----- ------- -------- ---------- --------
1 | No Auto 2 60 30 30 30
2 | No Auto 2 60 30 30 30