This table lists Infranet Controller authentication table entries. An auth table entry consists of the following:
Auth-ID: Indicates the unique identification number of the infranet user.
Source IP: Indicates the IP address of the client wired adapter, wireless adapter, or virtual adapter in the user’s computer.
User: Indicates the user's name.
Roles Name: Indicates the set of roles. The role identifies the protected network resources that users are authorized to access on the security device. For example, the administrator can create a role called “Employees” that allows full access to all resources and another role called “Contractors” that has limited access.