DELL 6024 User Manual

Page of 474
Configuring Switch Information
241
The following is an example of the CLI Command.
Authenticating Users
The Authenticated Users page displays user port access lists.
To open the Authenticated Users page, click Switch 
→ Network Security → Authenticated Users. 
Figure 7-5.
Authenticated Users
The Authenticated Users page contains the following fields:
User Name — List of users authorized via the RADIUS Server.
Port — Lists the port numbers used for authentication. The ports are listed by user name.
Session Time — The amount of time the user was logged on to the device. The field format is 
Day:Hour:Minute:Seconds, for example, 3 days: 2 hours: 4 minutes: 39 seconds. 
Authentication Method — The method by which the last session was authenticated. The possible 
field values are: 
Remote — The user was authenticated from a remote server.
None — The user was not authenticated.
dot1x single-host-
violation {forward 
|discard |discard-
shutdown}[trap 
seconds
]
Configures the action to be taken when a station, 
whose MAC address is not the client (supplicant) 
MAC address, attempts to access the interface.
Console(config)# 
interface ethernet 
g11
Console(config-if)# 
dot1x multiple-hosts
Table 7-2.
Multiple Hosts CLI Commands
CLI Command
Description