Specifications
Table Of Contents
- Table of Contents
- Preface Template Formats
- Web-based (GUI) Configuration
- Configuration
- Device Information
- System Information
- Serial Port Settings
- IP Address Settings
- IPv6 Address Settings
- IPv6 Route Settings
- IPv6 Neighbor Settings
- Port Configuration Folder
- Static ARP Settings
- User Accounts
- System Log Configuration Folder
- DHCP Relay Folder
- MAC Address Aging Time
- Web Settings
- Telnet Settings
- CLI Paging Settings
- Firmware Information
- SNTP Settings Folder
- SMTP Settings Folder
- SNMP Settings Folder
- Layer 2 Features
- Jumbo Frame
- VLANs
- 802.1Q Static VLAN
- Q-in-Q Folder
- 802.1v Protocol VLAN Folder
- GVRP Settings
- Asymmetric VLAN Settings
- MAC-based VLAN Settings
- PVID Auto Assign Settings
- Port Trunking
- LACP Port Settings
- Traffic Segmentation
- IGMP Snooping Folder
- MLD Snooping Settings
- Port Mirror
- Loopback Detection Settings Page
- Spanning Tree Folder
- Forwarding & Filtering Folder
- LLDP Folder
- Quality of Service (QoS)
- Security
- Access Control List (ACL)
- Monitoring
- Save and Tools
- System Log Entries
- Trap List

Chapter 5: Security
Extreme Networks EAS 100-24t Switch Software Manual
118
3 Configure the encryption algorithm that SSH will use to encrypt and decrypt messages sent between
the SSH client and the SSH server, using the SSH Authmode and Algorithm Settings window.
4 Finally, enable SSH on the Switch using the SSH Settings window.
After completing the preceding steps, a SSH Client on a remote PC can be configured to manage the
Switch using a secure, in band connection.
SSH Settings
The following window is used to configure and view settings for the SSH server.
To view this window, click Security > SSH > SSH Settings:
In this window, the following parameters can be configured:
Click on the Apply button to accept the changes made.
SSH Authmode and Algorithm Settings
The SSH Algorithm window allows the configuration of the desired types of SSH algorithms used for
authentication encryption. There are four categories of algorithms listed and specific algorithms of each
may be enabled or disabled by checking the boxes. All algorithms are enabled by default.
Parameters Description
SSH Server State Enable or disable SSH on the Switch. The default is Disabled.
Max Session (1-8) Enter a value between 1 and 8 to set the number of users that may
simultaneously access the Switch. The default setting is 8.
Connection Timeout (120-600) Allows the user to set the connection timeout. The use may set a time
between 120 and 600 seconds. The default setting is 120 seconds.
Authfail Attempts (2-20) Allows the Administrator to set the maximum number of attempts that a user
may try to log on to the SSH Server utilizing the SSH authentication. After the
maximum number of attempts has been exceeded, the Switch will be
disconnected and the user must reconnect to the Switch to attempt another
login. The number of maximum attempts may be set between 2 and 20. The
default setting is 2.
Rekey Timeout Using the pull-down menu uses this field to set the time period that the Switch
will change the security shell encryptions. The available options are Never, 10
min, 30 min, and 60 min. The default setting is Never.