NETGEAR GS700TR Switch User Manual


 
GS700TR Smart Switch Software Administration Manual
Managing Device Security 6-27
v1.0, May, 2008
Max EAP Requests This input field allows you to enter the maximum requests for the
selected port. The maximum requests value is the maximum number of
times the authenticator state machine on this port will retransmit an
EAPOL EAP Request/Identity before timing out the supplicant. The
maximum requests value must be in the range of 1 to 10. The default
value is 2. Changing the value will not change the configuration until
you click the Apply button.
Supplicant Timeout (secs) Defines the amount of time that lapses before EAP requests are resent
to the user. The field value is in seconds. The field default is 30
seconds.
Server Timeout (secs) Defines the amount of time that lapses before the switch resends a
request to the authentication server. The field value is in seconds. The
range is 1-65535, and the field default is 30 seconds.
Control Direction This displays the control direction for the specified port. The control
direction dictates the degree to which protocol exchanges take place
between Supplicant and Authenticator. This affects whether the
unauthorized controlled port exerts control over communication in both
directions (disabling both incoming and outgoing frames) or just in the
incoming direction (disabling only the reception of incoming frames).
This field is not configurable on some platforms.
Protocol Version This field displays the protocol version associated with the selected
port. The only possible value is 1, corresponding to the first version of
the 802.1X specification. This field is not configurable.
PAE Capabilities This field displays the port access entity (PAE) functionality of the
selected port. Possible values are Authenticator or Supplicant. This
field is not configurable.
Authenticator PAE State This field displays the current state of the authenticator PAE state
machine. Possible values are as follows:
Initialize
Disconnected
Connecting
Authenticating
Authenticated
Aborting
•Held
ForceAuthorized
ForceUnauthorized
Table 6-18. Port Authentication Port Configuration Fields (continued)
Field Description