Specifications

Table Of Contents
Access Authentication Control Folder
Extreme Networks EAS 100-24t Switch Software Manual
125
The Switch has four built-in Authentication Server Groups that cannot be removed but can be modified.
To modify a particular group, click on its corresponding Edit button or click the Edit Server Group tab
at the top of this window, the following tab will be displayed:
To add an Authentication Server Host to the list, enter its IP address in the IP Address field, choose the
protocol associated with the IP address of the Authentication Server Host and click Add to add this
Authentication Server Host to the group.
NOTE
The user must configure Authentication Server Hosts using the Authentication Server Hosts window before
adding hosts to the list. Authentication Server Hosts must be configured for their specific protocol on a remote
centralized server before this function can work properly.
NOTE
The four built in server groups can only have server hosts running the same TACACS daemon. TACACS/
XTACACS/TACACS+ protocols are separate entities and are not compatible with each other.
Authentication Server
This window will set user-defined Authentication Server Hosts for the TACACS/XTACACS/
TACACS+/RADIUS security protocols on the Switch. When a user attempts to access the Switch with
Authentication Policy enabled, the Switch will send authentication packets to a remote TACACS/
XTACACS/TACACS+/RADIUS server host on a remote host. The TACACS/XTACACS/TACACS+/
RADIUS server host will then verify or deny the request and return the appropriate message to the