You are here: Home > CLI Commands > Just_CLI_Topics > show dot1x counters

show dot1x counters

show dot1x counters

Description

Displays a table of dot1x counters.

Example

Issue this command to display all 802.1X802.1X is an IEEE standard for port-based network access control designed to enhance 802.11 WLAN security. 802.1X provides an authentication framework that allows a user to be authenticated by a central authority. counter information.

802.1X Counters

 

AP

Sync Request...................4

Sync Response..................3

Up.............................4

Down...........................1

Resps..........................4

Acl............................53

Station

Sync Request...................9

Sync Response..................9

Up.............................2321

Down...........................2272

Unknown........................72

EAP

RX Pkts........................4811

Dropped Pkts...................4497

TX Pkts........................5253

WPA

Message-1......................2484

Message-2......................63

Message-3......................63

Message-4......................63

Group Message-1................63

Group Message-2................63

Rx Failed......................2418

IE Mismatches..................4836

Key Exchange Failures..........602

WPA2

Message-1......................2630

Message-2......................13

Message-3......................13

Message-4......................13

Rx Failed......................2079

IE Mismatches..................4158

Key Exchange Failures..........549

Radius

Accept.........................1217

Station Deauths.................1151

 

 

The output of this command includes the following parameters:

Parameter

Description

AP

Sync Request

Sync Response

Up

Down

Resps

Acl

 

Number of sync requests sent

Number of sync responses sent

Number of times an AP has come up

Number of times an has gone down

Number of response messages sent to the AP due to an AP up message

Number of ACLsAccess Control List. ACL is a common way of restricting certain types of traffic on a physical port.

Station

Sync Request

Sync Response

Up

Down

Unknown

 

Number of sync requests sent to find all APs and stations that are connected

Number of sync responses received

Number of times a station (any station) connected to the AP

Number of times a station (any station) disconnected from the AP

Number of times a station attempted to start an EAPExtensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication.  exchange before associating to an AP. In other words, the number of times the auth module saw the start of an EAPExtensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication.  exchange before auth was notified that a station has associated an AP

EAP

RX Pkts

Dropped Pkts

TX Pkts

 

Number of EAPExtensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication.  packets received

Number of EAPExtensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication.  packets dropped (ignored) for any reason, such as bad packet, length, EAPExtensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication.  ID mismatch, etc.

Number of EAPExtensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication.  packets sent

WPA

Message-1

Message-2

Message-3

Message-4

Group Message-1

Group Message-2

Rx Failed

IE Mismatches

Key Exchange Failures

 

Number of WPAWi-Fi Protected Access. WPA is an interoperable wireless security specification subset of the IEEE 802.11 standard. This standard provides authentication capabilities and uses TKIP for data encryption. message-1s sent

Number of WPAWi-Fi Protected Access. WPA is an interoperable wireless security specification subset of the IEEE 802.11 standard. This standard provides authentication capabilities and uses TKIP for data encryption. message-2s sent

Number of WPAWi-Fi Protected Access. WPA is an interoperable wireless security specification subset of the IEEE 802.11 standard. This standard provides authentication capabilities and uses TKIP for data encryption. message-3s sent

Number of WPAWi-Fi Protected Access. WPA is an interoperable wireless security specification subset of the IEEE 802.11 standard. This standard provides authentication capabilities and uses TKIP for data encryption. message-4s sent

Number of WPAWi-Fi Protected Access. WPA is an interoperable wireless security specification subset of the IEEE 802.11 standard. This standard provides authentication capabilities and uses TKIP for data encryption. group message-1s sent

Number of WPAWi-Fi Protected Access. WPA is an interoperable wireless security specification subset of the IEEE 802.11 standard. This standard provides authentication capabilities and uses TKIP for data encryption. group message-2s sent

Number of WPAWi-Fi Protected Access. WPA is an interoperable wireless security specification subset of the IEEE 802.11 standard. This standard provides authentication capabilities and uses TKIP for data encryption. related EAPExtensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication.  packets dropped for any reason

Number of WPAWi-Fi Protected Access. WPA is an interoperable wireless security specification subset of the IEEE 802.11 standard. This standard provides authentication capabilities and uses TKIP for data encryption. related EAPExtensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication.  packets dropped because the station and controller have a different perception of what the connection details are

Number of key exchange failures

WPA2

Message-1

Message-2

Message-3

Message-4

Rx Failed

IE Mismatches

Key Exchange Failures

 

Number of WPA2Wi-Fi Protected Access 2. WPA2 is a certification program maintained by IEEE that oversees standards for security over wireless networks. WPA2 supports IEEE 802.1X/EAP authentication or PSK technology, but includes advanced encryption mechanism using CCMP that is referred to as AES. message-1s sent

Number of WPA2Wi-Fi Protected Access 2. WPA2 is a certification program maintained by IEEE that oversees standards for security over wireless networks. WPA2 supports IEEE 802.1X/EAP authentication or PSK technology, but includes advanced encryption mechanism using CCMP that is referred to as AES. message-2s sent

Number of WPA2Wi-Fi Protected Access 2. WPA2 is a certification program maintained by IEEE that oversees standards for security over wireless networks. WPA2 supports IEEE 802.1X/EAP authentication or PSK technology, but includes advanced encryption mechanism using CCMP that is referred to as AES. message-3s sent

Number of WPA2Wi-Fi Protected Access 2. WPA2 is a certification program maintained by IEEE that oversees standards for security over wireless networks. WPA2 supports IEEE 802.1X/EAP authentication or PSK technology, but includes advanced encryption mechanism using CCMP that is referred to as AES. message-4s sent

Number of WPA2Wi-Fi Protected Access 2. WPA2 is a certification program maintained by IEEE that oversees standards for security over wireless networks. WPA2 supports IEEE 802.1X/EAP authentication or PSK technology, but includes advanced encryption mechanism using CCMP that is referred to as AES. related EAPExtensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication.  packets dropped for any reason

Number of WPA2Wi-Fi Protected Access 2. WPA2 is a certification program maintained by IEEE that oversees standards for security over wireless networks. WPA2 supports IEEE 802.1X/EAP authentication or PSK technology, but includes advanced encryption mechanism using CCMP that is referred to as AES. related EAPExtensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication.  packets dropped because the station and controller have a different perception of what the connection details are

Number of key exchange failures

Radius

Accept

 

Number of RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.  accepts

Station Deauths

Number of stations deaths

Command History

Version

Modification

ArubaOS 8.0.0.0

Command introduced.

Command Information

Platforms

Licensing

Command Mode

All platforms

Base operating system.

Config or Enable mode on Mobility Master.

/*]]>*/