Viewing Authenticated Hosts; Defining Time Ranges - Cisco Small Business 300 Administration Manual

Managed switch release 1.3
Hide thumbs Also See for Small Business 300:
Table of Contents

Advertisement

17
STEP 4
STEP 1

Defining Time Ranges

339
-
Shutdown—Discards the packets and shuts down the port. The ports
remains shut down until reactivated, or until the device is rebooted.
Traps (on single host violation)—Select to enable traps.
Trap Frequency (on Single Host Violation)—Defines how often traps are
sent to the host. This field can be defined only if multiple hosts are disabled.
Click Apply. The settings are written to the Running Configuration file.

Viewing Authenticated Hosts

To view details about authenticated users:
Click Security > 802.1X > Authenticated Hosts.
This page displays the following fields:
User Name—Supplicant names that were authenticated on each port.
Port—Number of the port.
Session Time (DD:HH:MM:SS)—Amount of time that the supplicant was
logged on the port.
Authentication Method—Method by which the last session was
authenticated. The options are:
-
None—No authentication is applied; it is automatically authorized.
-
RADIUS—Supplicant was authenticated by a RADIUS server.
MAC Address—Displays the supplicant MAC address.
See
Time Range
for an explanation of this feature.
Cisco Small Business 300 Series Managed Switch Administration Guide
Security
Defining Time Ranges

Advertisement

Table of Contents
loading

This manual is also suitable for:

Small business 300 series

Table of Contents