Netgear GSM7252PS ProSafe Managed Switch Web Management User Manual - Page 477
Authenticator PAE State, Operating Control Mode
UPC - 606449071665
View all Netgear GSM7252PS manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 477 highlights
ProSafe® Gigabit L3 Managed Stackable Switches Software Administration Manual Table 6-94. Field Operating Control Mode Reauthentication Enabled Control Direction Protocol Version PAE Capabilities Authenticator PAE State Description This field indicates the control mode under which the port is actually operating. Possible values are: • ForceUnauthorized • ForceAuthorized • Auto • N/A: If the port is in detached state it cannot participate in port access control. This field shows whether reauthentication of the supplicant for the specified port is allowed. The possible values are 'true' and 'false'. If the value is 'true' reauthentication will occur. Otherwise, reauthentication will not be allowed. This displays the control direction for the specified port. The control direction dictates the degree to which protocol exchanges take place between Supplicant and Authenticator. This affects whether the unauthorized controlled port exerts control over communication in both directions (disabling both incoming and outgoing frames) or just in the incoming direction (disabling only the reception of incoming frames). This field is not configurable on some platforms. This field displays the protocol version associated with the selected port. The only possible value is 1, corresponding to the first version of the 802.1x specification. This field is not configurable. This field displays the port access entity (PAE) functionality of the selected port. Possible values are "Authenticator" or "Supplicant". This field is not configurable. This field displays the current state of the authenticator PAE state machine. Possible values are: • "Initialize" • "Disconnected" • "Connecting" • "Authenticating" • "Authenticated" • "Aborting" • "Held" • "ForceAuthorized" • "ForceUnauthorized". Chapter 6. Managing Device Security | 477