Inquiries to the switch are documented under Authentication Reports. Depending on the response received, which determines whether a device is authorized to access the network or not, the inquiry is classified as either successful or rejected. These reports provide information on the switch that was accessed, as well as the time of access.