hit counter script

Defining Host And Session Authentication - Cisco 200 Series Administration Manual

Hide thumbs Also See for 200 Series:
Table of Contents

Advertisement

Configuring Security
Configuring 802. 1 X
STEP 4
Cisco Small Business 200 Series Smart Switch Administration Guide
Quiet Period—Enter the number of seconds that the switch remains in the
quiet state following a failed authentication exchange.
Resending EAP—Enter the number of seconds that the switch waits for a
response to an Extensible Authentication Protocol (EAP) request/identity
frame from the supplicant (client) before resending the request.
Max EAP Requests—Enter the maximum number of EAP requests that can
be sent. If a response is not received after the defined period (supplicant
timeout), the authentication process is restarted.
Supplicant Timeout—Enter the number of seconds that lapses before EAP
requests are resent to the supplicant.
Server Timeout—Enter the number of seconds that lapses before the
switch resends a request to the authentication server.
Termination Cause—Displays the reason for which the port authentication
was terminated, if applicable.
Click Apply. The port settings are defined, and the switch is updated.

Defining Host and Session Authentication

The Host and Session Authentication Page enables defining the mode in which
802. 1 X operates on the port and the action to perform if a violation has been
detected.
The 802. 1 X modes are:
Single—Only a single authorized host can access the port. (Port Security
cannot be enabled on a port in single-host mode.)
Multiple Host (802. 1 X)—Multiple hosts can be attached to a single 802. 1 X-
enabled port. Only the first host must be authorized, and then the port is
wide-open for all who want to access the network. If the host authentication
fails, or an EAPOL-logoff message is received, all attached clients are
denied access to the network.
Multiple Sessions—Enables number of specific authorized hosts to access
the port. Each host is treated as if it were the first and only user and must be
authenticated. Filtering is based on the source MAC address.
16
188

Advertisement

Table of Contents
loading

Table of Contents