I'm wondering about the other parts of authentication. More specifically, deauthentication. I realize it must be an inherent part of authentication but I want to know if it is part of the command structure in the SRX series. Any and all commands can be discussed here. Maybe even parts where other commands might use this method. SYN is a part of this, but who knows exactly.
------------------------------
Adrian Aguinaga
B.S.C.M. I.T.T. Tech
(Construction Management)
A.A.S. I.T.T. Tech
(Drafting & Design)
------------------------------