D-Link xStack DGS-3420 Series Reference Manual page 259

Xstack dgs-3420 series layer 2 managed stackable gigabit switch web ui reference guide
Hide thumbs Also See for xStack DGS-3420 Series:
Table of Contents

Advertisement

xStack® DGS-3420 Series Layer 2 Managed Stackable Gigabit Switch Web UI Reference Guide
To view this window, click Security > RADIUS > RADIUS Authentication as shown below:
The user may also select the desired time interval to update the statistics, between 1s and 60s, where "s" stands
for seconds. The default value is one second.
The fields that can be configured are described below:
Parameter
InvalidServerAddr
Identifier
ServerIndex
AuthServerAddr
ServerPortNumber
RoundTripTime
AccessRequests
AccessRetrans
AccessAccepts
AccessRejects
AccessChallenges
AccessResponses
BadAuthenticators
PendingRequests
Figure 8-24 RAIUS Authentication window
Description
The number of RADIUS Access-Response packets received from unknown
addresses.
The NAS-Identifier of the RADIUS authentication client.
The identification number assigned to each RADIUS Authentication server that the
client shares a secret with.
The (conceptual) table listing the RADIUS authentication servers with which the
client shares a secret.
The UDP port the client is using to send requests to this server.
The time interval (in hundredths of a second) between the most recent Access-
Reply/Access-Challenge and the Access-Request that matched it from this RADIUS
authentication server.
The number of RADIUS Access-Request packets sent to this server. This does not
include retransmissions.
The number of RADIUS Access-Request packets retransmitted to this RADIUS
authentication server.
The number of RADIUS Access-Accept packets (valid or invalid) received from this
server.
The number of RADIUS Access-Reject packets (valid or invalid) received from this
server.
The number of RADIUS Access-Challenge packets (valid or invalid) received from
this server.
The number of malformed RADIUS Access-Response packets received from this
server. Malformed packets include packets with an invalid length. Bad
authenticators or Signature attributes or known types are not included as malformed
access responses.
The number of RADIUS Access-Response packets containing invalid authenticators
or Signature attributes received from this server.
The number of RADIUS Access-Request packets destined for this server that have
249

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Xstack dgs-3420-28sc

Table of Contents