Specifications

Command Line Interface
3-66
3
Example
Access Control List Commands
Access Control Lists (ACL) provide packet filtering for IP frames (based on address,
protocol, Layer 4 protocol port number or TCP control code) or any frames (based
on MAC address or Ethernet type). To filter packets, first create an access list, add
the required rules, specify a mask to modify the precedence in which the rules are
checked, and then bind the list to a specific port.
Console#show dot1x
Global 802.1X Parameters
reauth-enabled: yes
reauth-period: 300
quiet-period: 350
tx-period: 300
supp-timeout: 30
server-timeout: 30
reauth-max: 2
max-req: 2
802.1X Port Summary
Port Name Status Mode Authorized
1 disabled ForceAuthorized n/a
2 disabled ForceAuthorized n/a
.
.
.
11 disabled ForceAuthorized yes
12 enabled Auto yes
802.1X Port Details
802.1X is disabled on port 1
.
.
.
802.1X is enabled on port 12
Max request 2
Quiet period 350
Reauth period 300
Tx period 300
Status Unauthorized
Port-control Auto
Supplicant 00-00-00-00-00-00
Authenticator State Machine
State Connecting
Reauth Count 3
Backend State Machine
State Idle
Request Count 0
Identifier(Server) 0
Reauthentication State Machine
State Initialize
Console#