Netgear GSM7252PS ProSafe Managed Switch Web Management User Manual - Page 478
Session Termination Action, Key Transmission Enabled
UPC - 606449071665
View all Netgear GSM7252PS manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 478 highlights
ProSafe® Gigabit L3 Managed Stackable Switches Software Administration Manual Table 6-94. Field Backend State Vlan Assigned Vlan Assigned Reason Key Transmission Enabled Session Timeout Session Termination Action Description This field displays the current state of the backend authentication state machine. Possible values are: • "Request" • "Response" • "Success" • "Fail" • "Timeout" • "Initialize" • "Idle" This field displays the vlan id assigned to the selected interface by the Authenticator. This field is displayed only when the port control mode of the selected interface is not mac-based. This field is not configurable. This field displays reason for the vlan id assigned by the authenticator to the selected interface. This field is displayed only when the port control mode of the selected interface is not mac-based. This field is not configurable. Possible values are: • "Radius" • "Unauth" • "Default" • "Not Assigned" This field displays if key transmission is enabled on the selected port. This is not a configurable field. The possible values are 'true' and 'false'. If the value is 'false' key transmission will not occur. Otherwise Key transmission is supported on the selected port. This field displays Session Timeout set by the Radius Server for the selected port. This field is displayed only when the port control mode of the selected port is not mac-based. This field displays Termination Action set by the Radius Server for the selected port. This field is displayed only when the port control mode of the selected port is not mac-based. Possible values are: • "Default" • "Reauthenticate" If the termination action is 'default' then at the end of the session, the client details are initialized. Otherwise re-authentication is attempted. 478 | Chapter 6. Managing Device Security