Specifications

Table Of Contents
Chapter 5: Security
Extreme Networks EAS 100-24t Switch Software Manual
120
Click on the Apply button to accept the changes made.
SSH User Authentication Lists
The following windows are used to configure parameters for users attempting to access the Switch
through SSH.
To access the following window, click Security > SSH > SSH User Authentication Lists:
In the example above, the User Account “cts” has been previously set using the User Accounts window
in the Configuration folder. A User Account MUST be set in order to set the parameters for the SSH
user. To edit the parameters for a SSH user, click on the corresponding Edit button, which will reveal
the following window to configure:
In this window, the following parameters can be configured:
HMAC-SHA1 Tick the check box to enable the HMAC (Hash for Message Authentication
Code) mechanism utilizing the Secure Hash algorithm. The default is enabled.
HMAC-MD5 Tick the check box to enable the HMAC (Hash for Message Authentication
Code) mechanism utilizing the MD5 Message Digest encryption algorithm. The
default is enabled.
Public Key Algorithm
HMAC-RSA Tick the check box to enable the HMAC (Hash for Message Authentication
Code) mechanism utilizing the RSA encryption algorithm. The default is
enabled.
HMAC-DSA Tick the check box to enable the HMAC (Hash for Message Authentication
Code) mechanism utilizing the Digital Signature Algorithm encryption. The
default is enabled.
Parameters Description
User Name Enter a User Name of no more than 15 characters to identify the SSH user.
This User Name must be a previously configured user account on the Switch.
Parameters Description