Specifications
Table Of Contents
- Table of Contents
- Preface Template Formats
- Web-based (GUI) Configuration
- Configuration
- Device Information
- System Information
- Serial Port Settings
- IP Address Settings
- IPv6 Address Settings
- IPv6 Route Settings
- IPv6 Neighbor Settings
- Port Configuration Folder
- Static ARP Settings
- User Accounts
- System Log Configuration Folder
- DHCP Relay Folder
- MAC Address Aging Time
- Web Settings
- Telnet Settings
- CLI Paging Settings
- Firmware Information
- SNTP Settings Folder
- SMTP Settings Folder
- SNMP Settings Folder
- Layer 2 Features
- Jumbo Frame
- VLANs
- 802.1Q Static VLAN
- Q-in-Q Folder
- 802.1v Protocol VLAN Folder
- GVRP Settings
- Asymmetric VLAN Settings
- MAC-based VLAN Settings
- PVID Auto Assign Settings
- Port Trunking
- LACP Port Settings
- Traffic Segmentation
- IGMP Snooping Folder
- MLD Snooping Settings
- Port Mirror
- Loopback Detection Settings Page
- Spanning Tree Folder
- Forwarding & Filtering Folder
- LLDP Folder
- Quality of Service (QoS)
- Security
- Access Control List (ACL)
- Monitoring
- Save and Tools
- System Log Entries
- Trap List

Extreme Networks EAS 100-24t Switch Software Manual
103
CHAPTER
5
Security
Trusted Host
Use the Security IP Management to permit remote stations to manage the Switch. If one or more
designated management stations are defined by the user, only the chosen stations, as defined by the IP
address and subnet, will be allowed management privilege through the Web manager, Telnet session, or
SNMP manager. To define a management station IP setting, type in the IP address with a proper subnet
mask and click the Add button.
To view this window, click Security > Trusted Host:
In this window, the following parameters can be configured:
Click on the Add button to add a new entry.
Click on the Delete All button to remove all the entries.
Parameters Description
Permitted Access IP Specifies the trusted host permitted access IP address value used here.
Net Mask Specifies the trusted host subnet used here.