User guide

252 Configuring Device Information
Displaying the Authenticated Users Table
1
Open the
Add User Name
page.
2
Click
Show All
.
The
Authenticated Users Table
opens:
Figure 7-6. Authenticated Users Table
Authenticating Users Using the CLI Commands
The following table summarizes the equivalent CLI commands for authenticating users as displayed in
the Add User Name page.
The following is an example of the CLI commands:
Configuring Port Security
Network security can be increased by limiting access on a specific port only to users with specific MAC
addresses. The MAC addresses can be dynamically learned, up to that point, or they can be statically
configured. Locked port security monitors both received and learned packets that are received on specific
ports. Access to the locked port is limited to users with specific MAC addresses. These addresses are
either manually defined on the port, or learned on that port up to the point when it is locked. When a
Table 7-3. Add User Name CLI Commands
CLI Command Description
show dot1x users [username
username]
Displays 802.1X users for the device.
console# show dot1x users
Username Session
Time
Last
Auth
Auth
Method
MAC Address Interface
-------- -------- ----- -------- ----------------- --------
Bob 1d3h 58m Remote 00:08:3b:79:87:87 g1
John 8h19m 2m None 00:08:3b:89:31:27 g2