Security
Defining Time Ranges
339
Cisco Small Business 300 Series Managed Switch Administration Guide
17
-
Shutdown
—Discards the packets and shuts down the port. The ports
remains shut down until reactivated, or until the device is rebooted.
•
Traps
(on single host violation)—Select to enable traps.
•
Trap Frequency (on Single Host Violation)
—Defines how often traps are
sent to the host. This field can be defined only if multiple hosts are disabled.
STEP 4
Click
Apply
. The settings are written to the Running Configuration file.
Viewing Authenticated Hosts
To view details about authenticated users:
STEP 1
Click
Security
>
802.1X
>
Authenticated Hosts
.
This page displays the following fields:
•
User Name
—Supplicant names that were authenticated on each port.
•
Port
—Number of the port.
•
Session Time (DD:HH:MM:SS)
—Amount of time that the supplicant was
logged on the port.
•
Authentication Method
—Method by which the last session was
authenticated. The options are:
-
None
—No authentication is applied; it is automatically authorized.
-
RADIUS
—Supplicant was authenticated by a RADIUS server.
•
MAC Address
—Displays the supplicant MAC address.
Defining Time Ranges
See
Time Range
for an explanation of this feature.