Logo

Blackhole

Menu path: Configuration > Policies and Access Control > Authentication Sources > Exclusive > Blackhole.

The Blackhole authentication is used to drop authentication traffic. The fields in a Blackhole authentication source definition are:

Field Name Usage Example
Name The name of the authentication source. Blackhole
Description Description of the source. Drop auth traffic here

Copyright © 2021 Extreme Networks. All rights reserved. Published April 2021.