Specifications
Table Of Contents
- Table of Contents
- Preface Template Formats
- Web-based (GUI) Configuration
- Configuration
- Device Information
- System Information
- Serial Port Settings
- IP Address Settings
- IPv6 Address Settings
- IPv6 Route Settings
- IPv6 Neighbor Settings
- Port Configuration Folder
- Static ARP Settings
- User Accounts
- System Log Configuration Folder
- DHCP Relay Folder
- MAC Address Aging Time
- Web Settings
- Telnet Settings
- CLI Paging Settings
- Firmware Information
- SNTP Settings Folder
- SMTP Settings Folder
- SNMP Settings Folder
- Layer 2 Features
- Jumbo Frame
- VLANs
- 802.1Q Static VLAN
- Q-in-Q Folder
- 802.1v Protocol VLAN Folder
- GVRP Settings
- Asymmetric VLAN Settings
- MAC-based VLAN Settings
- PVID Auto Assign Settings
- Port Trunking
- LACP Port Settings
- Traffic Segmentation
- IGMP Snooping Folder
- MLD Snooping Settings
- Port Mirror
- Loopback Detection Settings Page
- Spanning Tree Folder
- Forwarding & Filtering Folder
- LLDP Folder
- Quality of Service (QoS)
- Security
- Access Control List (ACL)
- Monitoring
- Save and Tools
- System Log Entries
- Trap List

Chapter 7: Monitoring
Extreme Networks EAS 100-24t Switch Software Manual
182
To view the Authenticator Session Statistics window for MAC-based, click Monitoring > Port Access
Control > Authenticator Session Statistics:
The user may select the desired time interval to update the statistics, between 1s and 60s, where “s”
stands for seconds. The default value is one second.
The following fields can be viewed:
Parameters Description
Port The identification number assigned to the Port by the System in which the
Port resides.
Octets Rx The number of octets received in user data frames on this port during the
session.
Octets Tx The number of octets transmitted in user data frames on this port during the
session.
Frames Rx The number of user data frames received on this port during the session.
Frames Tx The number of user data frames transmitted on this port during the session.
ID A unique identifier for the session, in the form of a printable ASCII string of at
least three characters.
Authentic Method The authentication method used to establish the session. Valid Authentic
Methods include:
(1) Remote Authentic Server - The Authentication Server is external to the
Authenticator’s System.
(2) Local Authentic Server - The Authentication Server is located within the
Authenticator’s System.
Time The duration of the session in seconds.