222 Configuring Device Information• Status — The host status. The possible field values are:– Unauthorized — Clients (supplicants) have full port access.– Authorized — Cents (supplicants) have limited port access.• Number of Violations — The number of packets that arrived on the interface in single-host mode, from ahost whose MAC address is not the client (supplicant) MAC address.Displaying the Multiple Hosts Table1 Open the Multiple Hosts page.2 Click Show All.The Multiple Hosts Table opens:Figure 7-4. Multiple Hosts TableEnabling Multiple Hosts Using the CLI CommandsThe following table summarizes the equivalent CLI commands for enabling the advanced port basedauthentication as displayed in the Multiple Hosts page.Authenticating UsersThe Authenticated Users page displays user port access lists. The User Access Lists are defined in the AddUser Name page. To open the Authenticated Users page, click Switch → Network Security →Authenticated Users.Table 7-2. Multiple Hosts CLI CommandsCLI Command Descriptiondot1x multiple-hosts Allows multiple hosts (clients) on an 802.1X-authorized port that has the dot1x port-controlinterface configuration command set to auto.dot1x single-host-violation {forward|discard |discard-shutdown}[trap seconds]Configures the action to be taken when a station,whose MAC address is not the client (supplicant)MAC address, attempts to access the interface.