A SERVICE OF

logo

Security
Configuring 802.1X
Cisco Small Business 200 Series Smart Switch Administration Guide 270
17
STEP 2 Select a port, and click Edit.
STEP 3 Enter the parameters.
Interface—Enter a port number for which host authentication is enabled.
Host Authentication—Select one of the modes. These modes are
described above in Defining Host and Session Authentication.
The following fields are only relevant if you select Single in the Host
Authentication field.
Single Host Violation Settings:
Action on Violation—Select the action to be applied to packets arriving in
Single Session/Single Host mode, from a host whose MAC address is not
the supplicant MAC address. The options are:
- Protect (Discard)—Discards the packets.
- Restrict (Forward)—Forwards the packets.
- Shutdown—Discards the packets and shuts down the port. The ports
remains shut down until reactivated, or until the device is rebooted.
Traps (on single host violation)—Select to enable traps.
Trap Frequency (on Single Host Violation)—Defines how often traps are
sent to the host. This field can be defined only if multiple hosts are disabled.
STEP 4 Click Apply. The settings are written to the Running Configuration file.
Viewing Authenticated Hosts
To view details about authenticated users:
STEP 1 Click Security > 802.1X > Authenticated Hosts.
This page displays the following fields:
User Name—Supplicant names that were authenticated on each port.
Port—Number of the port.
Session Time (DD:HH:MM:SS)—Amount of time that the supplicant was
logged on the port.