Specifications
Table Of Contents
- Table of Contents
- Preface Template Formats
- Web-based (GUI) Configuration
- Configuration
- Device Information
- System Information
- Serial Port Settings
- IP Address Settings
- IPv6 Address Settings
- IPv6 Route Settings
- IPv6 Neighbor Settings
- Port Configuration Folder
- Static ARP Settings
- User Accounts
- System Log Configuration Folder
- DHCP Relay Folder
- MAC Address Aging Time
- Web Settings
- Telnet Settings
- CLI Paging Settings
- Firmware Information
- SNTP Settings Folder
- SMTP Settings Folder
- SNMP Settings Folder
- Layer 2 Features
- Jumbo Frame
- VLANs
- 802.1Q Static VLAN
- Q-in-Q Folder
- 802.1v Protocol VLAN Folder
- GVRP Settings
- Asymmetric VLAN Settings
- MAC-based VLAN Settings
- PVID Auto Assign Settings
- Port Trunking
- LACP Port Settings
- Traffic Segmentation
- IGMP Snooping Folder
- MLD Snooping Settings
- Port Mirror
- Loopback Detection Settings Page
- Spanning Tree Folder
- Forwarding & Filtering Folder
- LLDP Folder
- Quality of Service (QoS)
- Security
- Access Control List (ACL)
- Monitoring
- Save and Tools
- System Log Entries
- Trap List

Access Authentication Control Folder
Extreme Networks EAS 100-24t Switch Software Manual
127
Login Method Lists
This window is used to configure a user-defined or default Login Method List of authentication
techniques for users logging on to the Switch. The sequence of techniques implemented in this
command will affect the authentication result. For example, if a user enters a sequence of techniques, for
example TACACS – XTACACS - local, the Switch will send an authentication request to the first
TACACS host in the server group. If no response comes from the server host, the Switch will send an
authentication request to the second TACACS host in the server group and so on, until the list is
exhausted. At that point, the Switch will restart the same sequence with the following protocol listed,
XTACACS. If no authentication takes place using the XTACACS list, the local account database set in
the Switch is used to authenticate the user. When the local method is used, the privilege level will be
dependant on the local account privilege configured on the Switch.
When the user logins to the device successfully through TACACS/XTACACS/TACACS+/RADIUS
server or none method, the “user” privilege level is assigned only. If the user wants to get admin
privilege level, the user must use the Enable Admin window to promote his privilege level. (See the
Enable Admin part of this section for more detailed information.)
To view the following window, click Security > Access Authentication Control > Login Method Lists:
The Switch contains one Method List that is set and cannot be removed, yet can be modified. To delete
a Login Method List defined by the user, click the corressponding Delete button. To modify a Login
Method List, click on its corresponding Edit button.
In this window, the following parameters can be configured:
Parameters Description
Method List Name Enter a method list name defined by the user of up to 15 characters.