Netgear XCM89UP User Manual Software Version 11.x - Page 552
TACACS Overview, Authentication
View all Netgear XCM89UP manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 552 highlights
M6100, M5300, and M7100 Series Managed Switches Table 208. RADIUS Accounting Server Statistics Field Description Accounting Server Address The accounting server associated with the statistics. Round Trip Time(secs) The time interval, in hundredths of a second, between the most recent accounting-response and the accounting-request that matched it from this RADIUS accounting server. Accounting Requests The number of RADIUS accounting-request packets sent not including retransmissions. Accounting Retransmissions The number of RADIUS accounting-request packets retransmitted to this RADIUS accounting server. Accounting Responses The number of RADIUS packets received on the accounting port from this server. Malformed Accounting Responses The number of malformed RADIUS accounting-response packets received from this server. Malformed packets include packets with an invalid length. Bad authenticators and unknown types are not included as malformed accounting responses. Bad Authenticators The number of RADIUS accounting-response packets that contained invalid authenticators received from this accounting server. Pending Requests The number of RADIUS accounting-request packets sent to this server that did not yet time out or receive a response. Timeouts The number of accounting time-outs to this server. Unknown Types The number of RADIUS packets of unknown type that were received from this server on the accounting port. Packets Dropped The number of RADIUS packets that were received from this server on the accounting port and dropped for some other reason. TACACS Overview TACACS provides a centralized user management system, while still retaining consistency with RADIUS and other authentication processes. TACACS provides the following services: • Authentication. Provides authentication during login and through user names and user-defined passwords. • Authorization. Performed at login. When the authentication session is completed, an authorization session starts using the authenticated user name. The TACACS server checks the user privileges. The TACACS protocol ensures network security through encrypted protocol exchanges between the device and TACACS server. Manage Device Security 552