Configuring Security
Configuring 802. 1 X
STEP 4
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x
•
Action on Violation—Select the action to be applied to packets arriving in
Single Session/Single Host mode, from a host whose MAC address is not
the supplicant MAC address. The options are:
-
Protect (Discard)—Discards the packets.
-
Restrict (Forward)—Forwards the packets.
-
Shutdown—Discards the packets and shuts down the port. The ports
remains shut down until reactivated, or until the switch is rebooted.
•
Traps—Select to enable traps
•
Trap Frequency—Defines how often traps are sent to the host. This field can
be defined only if multiple hosts are disabled.
Click Apply. The settings are defined, and the Running Configuration file is
updated.
Viewing Authenticated Hosts
Click Security > 802.1X > Authenticated Hosts.
The Authenticated Hosts page displays the following fields:
•
User Name—Supplicant names that were authenticated on each port.
•
Port—Number of the port.
•
Session Time (DD:HH:MM:SS)—Amount of time that the supplicant was
logged on the port.
•
Authentication Method—Method by which the last session was
authenticated.
•
MAC Address—Displays the supplicant MAC address.
•
VLAN ID—Displays the supplicant VLAN ID.
16
213