Specifications
Table Of Contents
- Table of Contents
- Preface Template Formats
- Web-based (GUI) Configuration
- Configuration
- Device Information
- System Information
- Serial Port Settings
- IP Address Settings
- IPv6 Address Settings
- IPv6 Route Settings
- IPv6 Neighbor Settings
- Port Configuration Folder
- Static ARP Settings
- User Accounts
- System Log Configuration Folder
- DHCP Relay Folder
- MAC Address Aging Time
- Web Settings
- Telnet Settings
- CLI Paging Settings
- Firmware Information
- SNTP Settings Folder
- SMTP Settings Folder
- SNMP Settings Folder
- Layer 2 Features
- Jumbo Frame
- VLANs
- 802.1Q Static VLAN
- Q-in-Q Folder
- 802.1v Protocol VLAN Folder
- GVRP Settings
- Asymmetric VLAN Settings
- MAC-based VLAN Settings
- PVID Auto Assign Settings
- Port Trunking
- LACP Port Settings
- Traffic Segmentation
- IGMP Snooping Folder
- MLD Snooping Settings
- Port Mirror
- Loopback Detection Settings Page
- Spanning Tree Folder
- Forwarding & Filtering Folder
- LLDP Folder
- Quality of Service (QoS)
- Security
- Access Control List (ACL)
- Monitoring
- Save and Tools
- System Log Entries
- Trap List

Chapter 5: Security
Extreme Networks EAS 100-24t Switch Software Manual
124
In this window, the following parameters can be configured:
Click on the Apply button to accept the changes made.
Authentication Server Group
This window will allow users to set up Authentication Server Groups on the Switch. A server group is a
technique used to group TACACS/XTACACS/TACACS+/RADIUS server hosts into user-defined
categories for authentication using method lists. The user may define the type of server group by
protocol or by previously defined server group. The Switch has three built-in Authentication Server
Groups that cannot be removed but can be modified. Up to eight authentications server hosts may be
added to any particular group.
To view the following window, click Security > Access Authentication Control > Authentication
Server Group:
Parameters Description
Application Lists the configuration applications on the Switch. The user may configure the
Login Method List and Enable Method List for authentication for users utilizing
the Console (Command Line Interface) application, the Telnet application,
SSH, and the WEB (HTTP) application.
Login Method List Using the pull-down menu, configure an application for normal login on the
user level, utilizing a previously configured method list. The user may use the
default Method List or other Method List configured by the user. See the
Login Method Lists window, in this section, for more information.
Enable Method List Using the pull-down menu, configure an application for normal login on the
user level, utilizing a previously configured method list. The user may use the
default Method List or other Method List configured by the user. See the
Enable Method Lists window, in this section, for more information