Specifications

Table Of Contents
Access Authentication Control Folder
Extreme Networks EAS 100-24t Switch Software Manual
121
Click on the Apply button to accept the changes made.
NOTE
To set the SSH User Authentication parameters on the Switch, a User Account must be previously
configured. For more information on configuring local User Accounts on the Switch, see the User Accounts section
of this manual located in the Configuration section.
Access Authentication Control Folder
The TACACS/XTACACS/TACACS+/RADIUS commands allow users to secure access to the Switch
using the TACACS/XTACACS/TACACS+/RADIUS protocols. When a user logs in to the Switch or
tries to access the administrator level privilege, he or she is prompted for a password. If TACACS/
XTACACS/TACACS+/RADIUS authentication is enabled on the Switch, it will contact a TACACS/
XTACACS/TACACS+/RADIUS server to verify the user. If the user is verified, he or she is granted
access to the Switch.
There are currently three versions of the TACACS security protocol, each a separate entity. The Switch's
software supports the following versions of TACACS:
TACACS (Terminal Access Controller Access Control System) - Provides password checking and
authentication, and notification of user actions for security purposes utilizing via one or more
centralized TACACS servers, utilizing the UDP protocol for packet transmission.
Extended TACACS (XTACACS) - An extension of the TACACS protocol with the ability to provide
more types of authentication requests and more types of response codes than TACACS. This protocol
also uses UDP to transmit packets.
Auth. Mode The administrator may choose one of the following to set the authorization for
users attempting to access the Switch.
Host Based – This parameter should be chosen if the administrator wishes to
use a remote SSH server for authentication purposes. Choosing this
parameter requires the user to input the following information to identify the
SSH user.
Host Name – Enter an alphanumeric string of no more than 32 characters to
identify the remote SSH user.
Host IP – Enter the corresponding IP address of the SSH user.
Password – This parameter should be chosen if the administrator wishes to
use an administrator-defined password for authentication. Upon entry of this
parameter, the Switch will prompt the administrator for a password, and then
to re-type the password for confirmation.
Public Key – This parameter should be chosen if the administrator wishes to
use the publickey on a SSH server for authentication.
Host Name Enter an alphanumeric string of no more than 32 characters to identify the
remote SSH user. This parameter is only used in conjunction with the Host
Based choice in the Auth. Mode field.
Host IP Enter the corresponding IP address of the SSH user. This parameter is only
used in conjunction with the Host Based choice in the Auth. Mode field.
Parameters Description