Specifications
Table Of Contents
- Table of Contents
- Preface Template Formats
- Web-based (GUI) Configuration
- Configuration
- Device Information
- System Information
- Serial Port Settings
- IP Address Settings
- IPv6 Address Settings
- IPv6 Route Settings
- IPv6 Neighbor Settings
- Port Configuration Folder
- Static ARP Settings
- User Accounts
- System Log Configuration Folder
- DHCP Relay Folder
- MAC Address Aging Time
- Web Settings
- Telnet Settings
- CLI Paging Settings
- Firmware Information
- SNTP Settings Folder
- SMTP Settings Folder
- SNMP Settings Folder
- Layer 2 Features
- Jumbo Frame
- VLANs
- 802.1Q Static VLAN
- Q-in-Q Folder
- 802.1v Protocol VLAN Folder
- GVRP Settings
- Asymmetric VLAN Settings
- MAC-based VLAN Settings
- PVID Auto Assign Settings
- Port Trunking
- LACP Port Settings
- Traffic Segmentation
- IGMP Snooping Folder
- MLD Snooping Settings
- Port Mirror
- Loopback Detection Settings Page
- Spanning Tree Folder
- Forwarding & Filtering Folder
- LLDP Folder
- Quality of Service (QoS)
- Security
- Access Control List (ACL)
- Monitoring
- Save and Tools
- System Log Entries
- Trap List

SSH Folder
Extreme Networks EAS 100-24t Switch Software Manual
117
Click on the Download button to download the SSL Certificate.
Click on the Apply button to accept the changes made.
NOTE
Enabling the SSL command will disable the web-based switch management. To log on to the Switch again,
the header of the URL must begin with https://. Entering anything else into the address field of the web browser will
result in an error and no authentication will be granted.
SSH Folder
SSH is an abbreviation of Secure Shell, which is a program allowing secure remote login and secure
network services over an insecure network. It allows a secure login to remote host computers, a safe
method of executing commands on a remote end node, and will provide secure encrypted and
authenticated communication between two non-trusted hosts. SSH, with its array of unmatched security
features is an essential tool in today’s networking environment. It is a powerful guardian against
numerous existing security hazards that now threaten network communications.
The steps required to use the SSH protocol for secure communication between a remote PC (the SSH
client) and the Switch (the SSH server) are as follows:
1 Create a user account with admin-level access using the User Accounts window in the
Configuration folder. This is identical to creating any other admin-level User Account on the Switch,
including specifying a password. This password is used to logon to the Switch, once a secure
communication path has been established using the SSH protocol.
2 Configure the User Account to use a specified authorization method to identify users that are
allowed to establish SSH connections with the Switch using the SSH User Authentication window.
There are three choices as to the method SSH will use to authorize the user, which are Host Based,
Password and Public Key.
RSA with RC4_128_MD5 This ciphersuite combines the RSA key exchange, stream cipher RC4
encryption with 128-bit keys and the MD5 Hash Algorithm. Use the pull-down
menu to enable or disable this ciphersuite. This field is enabled by default.
RSA with 3DES EDE CBC
SHA
This ciphersuite combines the RSA key exchange, CBC Block Cipher
3DES_EDE encryption and the SHA Hash Algorithm. Use the pull-down menu
to enable or disable this ciphersuite. This field is enabled by default.
DHE DSS with 3DES EDE
CBC SHA
This ciphersuite combines the DSA Diffie Hellman key exchange, CBC Block
Cipher 3DES_EDE encryption and SHA Hash Algorithm. Use the pull-down
menu to enable or disable this ciphersuite. This field is enabled by default.
RSA EXPORT with RC4 40
MD5
This ciphersuite combines the RSA Export key exchange and stream cipher
RC4 encryption with 40-bit keys. Use the pull-down menu to enable or disable
this ciphersuite. This field is enabled by default.
SSL Certificate Download
Server IP Address Enter the IP address of the TFTP server where the certificate files are located.
Certificate File Name Enter the path and the filename of the certificate file to download. This file
must have a .der extension. (Ex. c:/cert.der)
Key File Name Enter the path and the filename of the key file to download. This file must
have a .der extension (Ex. c:/pkey.der)
Parameters Description