Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Highlighted
Participant

CLI Command to check Authentication Activity

Jump to solution

Hi Checkmates, 

Do we have any CLI command to check the device Authentication activity? I need to get the below details in CLI.

 

Capture.JPG

 
0 Kudos
1 Solution

Accepted Solutions
Highlighted
Employee++
Employee++

Hi 

You can try the command cpstat identityServer -f <value> where the value can be:

default, authentication, logins, ldap, components, adquery, idc, muh

 

For example cpstat identityServer -f ldap gives:

Successful LDAP Queries: -
Unsuccessful LDAP Queries: -

 

For example cpstat identityServer -f ldap gives:

CaptivePortal: -
AD Query: -
Agent: -
Terminal Server: -
RADIUS Accounting: -
Remote Access: -
Identity Collector [Active Directory]: -
Identity Collector [Cisco ISE]: -
Identity Collector [Syslog]: -
Identity Collector [eDirectory]: -
Identity Awareness API: -
Users With Anti-Spoofing Protection: -
Successful User Logins [Kerberos]: -
Successful Machine Logins [Kerberos]: -
Successful User Logins [User name and password]: -
Successful User Logins [AD Query]: -
Successful Machine Logins [AD Query]: -
Unsuccessful User Logins [Kerberos]: -
Unsuccessful Machine Logins [Kerberos]: -
Unsuccessful User Logins [User name and password]: -

 

HTH

Tal

View solution in original post

2 Replies
Highlighted
Champion
Champion

In Identity Awareness Administration Guide R80.20 p.161ff you will find the CLI commands for IA - adlog, pdp and pep !

Highlighted
Employee++
Employee++

Hi 

You can try the command cpstat identityServer -f <value> where the value can be:

default, authentication, logins, ldap, components, adquery, idc, muh

 

For example cpstat identityServer -f ldap gives:

Successful LDAP Queries: -
Unsuccessful LDAP Queries: -

 

For example cpstat identityServer -f ldap gives:

CaptivePortal: -
AD Query: -
Agent: -
Terminal Server: -
RADIUS Accounting: -
Remote Access: -
Identity Collector [Active Directory]: -
Identity Collector [Cisco ISE]: -
Identity Collector [Syslog]: -
Identity Collector [eDirectory]: -
Identity Awareness API: -
Users With Anti-Spoofing Protection: -
Successful User Logins [Kerberos]: -
Successful Machine Logins [Kerberos]: -
Successful User Logins [User name and password]: -
Successful User Logins [AD Query]: -
Successful Machine Logins [AD Query]: -
Unsuccessful User Logins [Kerberos]: -
Unsuccessful Machine Logins [Kerberos]: -
Unsuccessful User Logins [User name and password]: -

 

HTH

Tal

View solution in original post