Specifications

Table Of Contents
Table of Contents
Extreme Networks EAS 100-24t Switch Software Manual
5
DSCP Mapping.....................................................................................................................................................102
Chapter 5: Security.................................................................................................................................103
Trusted Host.........................................................................................................................................................103
Port Security Folder..............................................................................................................................................104
Port Security Port Settings ............................................................................................................................104
Port Security FDB Entries .............................................................................................................................105
Authentication Settings.........................................................................................................................................105
802.1X Folder.......................................................................................................................................................106
802.1X Settings.............................................................................................................................................110
802.1X User ..................................................................................................................................................111
Authentication RADIUS Server .....................................................................................................................112
SSL Settings.........................................................................................................................................................115
SSH Folder...........................................................................................................................................................117
SSH Settings.................................................................................................................................................118
SSH Authmode and Algorithm Settings ........................................................................................................118
SSH User Authentication Lists ......................................................................................................................120
Access Authentication Control Folder ..................................................................................................................121
Authentication Policy Settings.......................................................................................................................122
Application Authentication Settings ...............................................................................................................123
Authentication Server Group ........................................................................................................................124
Authentication Server....................................................................................................................................125
Login Method Lists ........................................................................................................................................127
Enable Method Lists......................................................................................................................................128
Local Enable Password Settings...................................................................................................................129
MAC-based Access Control Folder ......................................................................................................................130
MAC-based Access Control Settings ............................................................................................................130
MAC-based Access Control Local Settings...................................................................................................132
Chapter 6: Access Control List (ACL) ..................................................................................................135
ACL Configuration Wizard....................................................................................................................................135
Access Profile List ................................................................................................................................................136
Access Profile List – Enternet ACL ...............................................................................................................137
Access Profile List – IPv4 ACL......................................................................................................................142
Access Profile List – IPv6 ACL......................................................................................................................147
Access Profile List – Packet Content ACL ....................................................................................................152
ACL Finder ...........................................................................................................................................................155
ACL Flow Meter....................................................................................................................................................156
Chapter 7: Monitoring ............................................................................................................................159
Cable Diagnostics ................................................................................................................................................159
CPU Utilization .....................................................................................................................................................159
Port Utilization ......................................................................................................................................................161
Packet Size ..........................................................................................................................................................161
Memory Utilization................................................................................................................................................163
Packets Folder .....................................................................................................................................................164
Received (Rx) ...............................................................................................................................................164
UMB_cast (Rx)..............................................................................................................................................166
Transmitted (Tx)............................................................................................................................................168
Errors Folder ........................................................................................................................................................170
Received (RX)...............................................................................................................................................170
Transmitted (TX) ...........................................................................................................................................172
Port Access Control Folder...................................................................................................................................174
RADIUS Authentication.................................................................................................................................174
RADIUS Account Client ................................................................................................................................175