Dell X1000 Networking X-Series Switches User Guide - Page 253

Resending EAP Identity Request 1-65535

Page 253 highlights

FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_Astute_Network_Admin_Security.fm - Reauthenticate Now - Select to enable immediate port re-authentication. - Authentication Server Timeout (1-65535) - Enter the time interval that lapses before the device resends a request to the authentication server. The field value is specified in seconds. - Resending EAP Identity Request (1-65535) - Enter the amount of time that lapses before EAP request are resent. - Quiet Period (10-65535) - Enter the number of seconds that the device remains in the quiet state, following a failed authentication exchange. - Supplicant Timeout (1-65535) - Enter the amount of time that lapses before EAP requests are resent to the supplicant. The field value is in seconds. - Max EAP Requests (1-10) - Enter the maximum number of EAP requests that can be sent. If a response is not received after the defined period (supplicant timeout), the authentication process is restarted. Host Authentication Use the Host Authentication page to define the authentication mode on the port, and the action to perform if a violation is detected. To view ports and their authentication information: 1 Click Network Administration > Security > Dot1 Authentications > Host Authentication. A list of the ports and their authentication modes is displayed. The fields are defined on the Edit page with the exception of the following field: - Single Host Status - Displays the host status. The possible options are: • Unauthorized - The port control is Force Unauthorized, the port link is down or the port control is Auto, but a client has not been authenticated via the port. • Not in Auto Mode - The port control is Forced Authorized, and clients have full port access. • Single-host Lock - The port control is Auto and a single client has been authenticated via the port. DELL CONFIDENTIAL - PRELIMINARY 8/9/16 - FOR PROOF ONLY Network Administration: Security 253

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416

Network Administration: Security
253
FILE LOCATION:
C:\Users\gina\Desktop\Checkout_new\Dell Astute\User
Guide\Dell_Astute_Network_Admin_Security.fm
DELL CONFIDENTIAL – PRELIMINARY 8/9/16 - FOR PROOF ONLY
Reauthenticate Now
— Select to enable immediate port
re-authentication.
Authentication Server Timeout (1-65535)
— Enter the time interval
that lapses before the device resends a request to the authentication
server. The field value is specified in seconds.
Resending EAP Identity Request (1-65535)
— Enter the amount of
time that lapses before EAP request are resent.
Quiet Period (10-65535)
— Enter the number of seconds that the
device remains in the quiet state, following a failed authentication
exchange.
Supplicant Timeout (1-65535)
— Enter the amount of time that
lapses before EAP requests are resent to the supplicant. The field
value is in seconds.
Max EAP Requests (1-10)
— Enter the maximum number of EAP
requests that can be sent. If a response is not received after the defined
period (supplicant timeout), the authentication process is restarted.
Host Authentication
Use the
Host Authentication
page to define the authentication mode on the
port, and the action to perform if a violation is detected.
To view ports and their authentication information:
1
Click
Network Administration
>
Security
>
Dot1 Authentications
>
Host Authentication
.
A list of the ports and their authentication modes is displayed. The fields
are defined on the
Edit
page with the exception of the following field:
Single Host Status
— Displays the host status. The possible options
are:
Unauthorized
— The port control is
Force Unauthorized
, the
port link is down or the port control is
Auto
, but a client has not
been authenticated via the port.
Not in Auto Mode
— The port control is
Forced Authorized
, and
clients have full port access.
Single-host Lock
— The port control is
Auto
and a single client
has been authenticated via the port.