![](https://pdfstore-manualsonline.prod.a.ki/pdfasset/e/4d/e4dfb64e-81a0-4a35-a2a5-f7a861b4d369/e4dfb64e-81a0-4a35-a2a5-f7a861b4d369-bg164.png)
Security
Defining Time Ranges
339 Cisco Small Business 300 Series Managed Switch Administration Guide
17
- Shutdown—Discards the packets and shuts down the port. The ports
remains shut down until reactivated, or until the device is rebooted.
• Traps (on single host violation)—Select to enable traps.
• Trap Frequency (on Single Host Violation)—Defines how often traps are
sent to the host. This field can be defined only if multiple hosts are disabled.
STEP 4 Click Apply. The settings are written to the Running Configuration file.
Viewing Authenticated Hosts
To view details about authenticated users:
STEP 1 Click Security > 802.1X > Authenticated Hosts.
This page displays the following fields:
• User Name—Supplicant names that were authenticated on each port.
• Port—Number of the port.
• Session Time (DD:HH:MM:SS)—Amount of time that the supplicant was
logged on the port.
• Authentication Method—Method by which the last session was
authenticated. The options are:
- None—No authentication is applied; it is automatically authorized.
- RADIUS—Supplicant was authenticated by a RADIUS server.
• MAC Address—Displays the supplicant MAC address.
Defining Time Ranges
See Time Range for an explanation of this feature.