Logo

Blackhole

Menu path: Configuration > Policies and Access Control > Authentication Sources > Exclusive > Blackhole.

The Blackhole authentication is used to drop authentication traffic. The fields in a Blackhole authentication source definition are:

Field Name Usage Example
Name The name of the authentication source. Blackhole
Description Description of the source. Drop auth traffic here

Copyright © 2023 Extreme Networks. All rights reserved. Published March 28, 2023.