Chapter 9: Security
Extreme Networks EAS 100-24t Switch CLI Manual
290
Usage example:
This example displays authentication setting for all ports:
SSH Commands
The steps required to use the Secure Shell (SSH) protocol for secure communication between a remote
PC (the SSH Client) and the switch (the SSH Server), are as follows:
1 Create a user account with admin-level access using the create account admin <username>
<password> command. This is identical to creating any other admin-level user account on the
switch, including specifying a password. This password is used to login to the switch, once secure
communication has been established using the SSH protocol.
2 Configure the user account to use a specified authorization method to identify users that are allowed
to establish SSH connections with the switch using the config ssh authmode command. There are
three choices as to the method SSH will use to authorize the user, and they are password, publickey
and hostbased.
3 Configure the encryption algorithm that SSH will use to encrypt and decrypt messages sent between
the SSH Client and the SSH Server.
4 Finally, enable SSH on the switch using the enable ssh command.
After following the above steps, you can configure an SSH Client on the remote PC and manage the
switch using secure, in-band communication.
show authentication ports
Purpose This command is used to display authentication setting on port(s).
Syntax show authentication ports {<portlist>}
Description This command is used to display authentication setting on port(s).
Parameters <portlist> - Specifies to display multiple authentication on the specified port(s).
If no ports are specified, all the ports' multiple authentication settings will be
displayed.
Restrictions None.
#show authentication ports 1-5
Command: show authentication ports 1-5
Port Authorized Mode
---- -----------------
1 Port_based
2 Port_based
3 Port_based
4 Port_based
5 Port_based
#