You are here: Home > CLI Commands > Just_CLI_Topics > show dot1x supplicant-info

show dot1x supplicant-info

show dot1x supplicant-info <supplicant-mac> <ap-mac>

Description

Shows the details about a specific supplicant.

Example

Issue this command to display the details about a supplicant.

Name MYCORPNETWORKS\ccutler

MAC Address 00:19:7e:a9:8e:b0

AP MAC Address 00:1a:1e:11:5f:11

Status Authentication Success

Unicast Cipher WPA2-AES

Multicast Cipher WPA2-AES

EAP-Type EAP-PEAP

Packet Statistics:

EAPOL Starts 0

EAP ID Requests 0

EAP ID Responses 0

EAPOL Logoffs from station 0

EAP pkts to the station 2

EAP pkts from station 2

Unknown EAP pkts from station 0

EAP Successes sent 0

EAP Failures sent 0

Station failed to respond 0

Station NAKs 0

Radius pkts to the server 0

Radius pkts from the server 0

Server failed to respond 0

Server rejects 0

WPA/WPA2-Key Message1 1

WPA/WPA2-Key Message2 1

WPA/WPA2-Key Message3 1

WPA/WPA2-Key Message4 1

WPA-GKey Message1 0

WPA-GKey Message2 0

ID of the last EAP request 0

Length of the last EAP request 151

ID of the last EAP response 0

Length of the last EAP response 0

ID of the last radius request 0

Length of the last radius request 0

ID of the last radius response 0

 

The output of this command includes the following parameters:

Parameter

Description

Name

Supplicant name.

MAC Address

Supplicant MACMedia Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network. address.

AP MAC Address

AP MACMedia Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network. address.

Status

Supplicant’s status.

Unicast Cipher

Supplicant’s unicast cipher.

Multicast Cipher

Supplicant’s multicast cipher.

EAP-Type

Supplicant’s EAPExtensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication. -Type.

EAPOL Starts

Number of EAPOL starts.

EAP ID Requests

Number of EAPExtensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication.  ID requests.

EAP ID Responses

Number of EAPExtensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication.  ID responses.

EAPOL Logoffs from station

Number of EAPOL logoffs from the station.

EAP pkts to the station

Number of EAPExtensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication.  packets sent to the station.

EAP pkts from station

Number of EAPExtensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication.  packets sent from the station.

Unknown EAP pkts from station

Number of unknown EAPExtensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication.  packets sent from the station.

EAP Successes sent

Number of EAPExtensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication.  successes sent.

EAP Failures sent

Number of EAPExtensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication.  failures sent.

Station failed to respond

Number of times the station failed to respond.

Station NAKs

Number of station negative-acknowledgement characters.

Radius pkts to the server

Number of RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.  packets set to the server.

Radius pkts from the server

Number of RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.  packets sent from the server.

Server failed to respond

Number of times the server failed to respond.

Server rejects

Number of times ac connection was rejected by the server.

WPA/WPA2-Key Message1

Number of WPAWi-Fi Protected Access. WPA is an interoperable wireless security specification subset of the IEEE 802.11 standard. This standard provides authentication capabilities and uses TKIP for data encryption. message-1s sent

WPA/WPA2-Key Message2

Number of WPAWi-Fi Protected Access. WPA is an interoperable wireless security specification subset of the IEEE 802.11 standard. This standard provides authentication capabilities and uses TKIP for data encryption. message-2s sent.

WPA/WPA2-Key Message3

Number of WPAWi-Fi Protected Access. WPA is an interoperable wireless security specification subset of the IEEE 802.11 standard. This standard provides authentication capabilities and uses TKIP for data encryption. message-3s sent.

WPA/WPA2-Key Message4

Number of WPAWi-Fi Protected Access. WPA is an interoperable wireless security specification subset of the IEEE 802.11 standard. This standard provides authentication capabilities and uses TKIP for data encryption. message-4s sent.

WPA-GKey Message1

Number of WPAWi-Fi Protected Access. WPA is an interoperable wireless security specification subset of the IEEE 802.11 standard. This standard provides authentication capabilities and uses TKIP for data encryption. group message-1s sent.

WPA-GKey Message2

Number of WPAWi-Fi Protected Access. WPA is an interoperable wireless security specification subset of the IEEE 802.11 standard. This standard provides authentication capabilities and uses TKIP for data encryption. group message-2s sent.

ID of the last EAP request

The ID of the last EAPExtensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication.  request.

Length of the last EAP request

The length of the last EAPExtensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication.  request.

ID of the last EAP response

The ID of the last EAPExtensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication.  response.

Length of the last EAP response

The length of the last EAPExtensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication.  response.

ID of the last radius request

The ID of the last RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.  request.

Length of the last radius request

The length of the last RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.  request.

ID of the last radius response

The ID of the last RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.  response.

Length of the last radius response

The length of the last RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.  response.

Related Commands

Command

Description

show dot1x supplicant-info list-all

This command shows all 802.1X802.1X is an IEEE standard for port-based network access control designed to enhance 802.11 WLAN security. 802.1X provides an authentication framework that allows a user to be authenticated by a central authority. supplicants.

show dot1x supplicant-info pmkid

This command shows the PMKIDs of the various stations on the controller.

show dot1x supplicant-info statistics

This command shows the 802.1X802.1X is an IEEE standard for port-based network access control designed to enhance 802.11 WLAN security. 802.1X provides an authentication framework that allows a user to be authenticated by a central authority. statistics of the users.

show dot1x supplicant-info reauth-table

This command shows the reauthentication related information.

Command History

Version

Modification

ArubaOS 8.0.0.0

Command introduced.

Command Information

Platforms

Licensing

Command Mode

All platforms

Base operating system.

Enable or config mode on Mobility Master.

/*]]>*/