User's Guide

Table Of Contents
Network Settings
143 of 218
Port
The port field allows you to configure a custom port used when launching SSH to
the engine. The standard default port number is 22.
Disable Remote root Access
Select this option to disable remote root access via SSH to the engine and force a
user to first log in with a real user account and then su to root (or use sudo) to
perform an action. When remote root access is allowed, there is no way to
determine who is accessing the engine. With remote root access disabled, the
/var/log/message file displays users who log in and su to root. The log messages
looks like these two examples:
sshd[19735]: Accepted password for <username> from 10.20.30.40 port 36777 ssh2
su[19762]: + pts/2 <username>-root
Enabling this option does not disable root access via the console. Make sure that
you don't disable root access unless you have configured RADIUS authentication or
this disables remote access to the ExtremeAnalytics engine.
SSH Users
Use the toolbar buttons to create a list of users allowed to log in to the
ExtremeAnalytics engine using SSH. Click the Add button to open a blank box in
which you can enter an IPaddress. Select an IPaddress in the table and click the