Security: 802.1X Authentication
Overview
358 Cisco 350, 350X and 550X Series Managed Switches, Firmware Release 2.4, ver 0.4
18
The following options are available:
• restrict—Generates a trap when a station, whose MAC address is not the supplicant 
MAC address, attempts to access the interface. The minimum time between the traps is 
1 second. These frames are forwarded, but their source addresses are not learned.
• protect—Discard frames with source addresses that are not the supplicant address.
• shutdown—Discard frames with source addresses that are not the supplicant address 
and shutdown the port.
You can also configure the device to send SNMP traps, with a configurable minimum time 
between consecutive traps. If seconds = 0, traps are disabled. If minimum time is not specified, 
it defaults to 1 second for the restrict mode and 0 for the other modes. 
Quiet Period
The Quiet period is a period when the port (single-host or multi-host modes) or the client 
(multi-sessions mode) cannot attempt authentication, following a failed authentication 
exchange. In single-host or multi-host mode, the period is defined per port, and in the multi-
sessions mode the period is defined per client. During the quiet period, the switch does not 
accept or initiate authentication requests. 
The period is only applied to 802.1x-based and Web-based authentications.
You can also specify the maximum number of login attempts before the quiet period is started. 
A value of 0 specifies the unlimited number of login attempts.
The duration of the quiet period and the maximum number of login attempts can be set in the 
Port Authentication page.