Sie sind auf Seite 1von 4

EXTREME NETWORKS EDUCATION AND TRAINING

Remote Lab Access – Single Switch


Access Instructions and Sample Commands to Practice

Welcome to Extreme Networks® Remote Lab 4. If this PuTTY Security Alert message appears,
Access – Single Switch! select Yes.
There are four Extreme Networks single switches available
to you on a first come, first served basis.

To access the single switch remote lab access, you can use
either PuTTY* or another commercial alternative to access
the switch.

Making a SSH Connection Using PuTTY


1. PuTTY runs as an executable application which can be
downloaded from the PuTTY Download Page (http://
www.chiark.greenend.org.uk/~sgtatham/putty/down-
load.html). PuTTY is a third party tool and is not pro-
vided by Extreme Networks.
2. Once you have this application, open it. A console window is presented with the prompt to
login as:
3. Complete the following steps:
Host Name (or IP address)’: 207.179.9.156
5. Choose to login as guest1, guest2, guest3, or guest4
Select Connection type: ‘SSH’ and verify Port 22
using the credentials displayed in Table 1.
is entered.
Click the ‘Open’ button. Table 1
Switch Number IP Address/SSH Port 22 Login as: Password:
Switch 1 207.179.9.156:port22 guest1:port1 guest1
Switch 2 207.179.9.156:port22 guest2:port2 guest2
Switch 3 207.179.9.156:port22 guest3:port3 guest3
Switch 4 207.179.9.156:port22 guest4:port4 guest4

For example, to login as guest2 enter the following


commands:
Login as: guest2:port2
Password: guest2
EXTREME NETWORKS EDUCATION AND TRAINING

6. After you enter the password, press the Enter Key two When you see the command line prompt, X450a-24t.1 #,
or three times until the login prompt appears. you can begin entering commands on the switch. There is
a list of sample commands later on in this document for
Remember: Each switch is available on a first come, first you to try.
served basis. If you try to login as guest1:port1 with pass-
word guest1 and the console window instantly disap- When you are finished please close the connection to
pears it means someone is on switch1. Start again at step the switch.
2 and try guest2:port2 and so on, until the window remains
open and the next login prompt appears. Questions or Comments?
Send us an email:
This login prompt provides access to the command line coursedevelopers@extremenetworks.com
interface of the switch.

Enter the following credentials:


login: admin
password: {no password - press the Enter
Key twice}

This screenshot shows the output displayed from switch 2


when using guest2 credentials to connect:

© 2009 Extreme Networks, Inc. All rights reserved. Single Switch Access Instructions and Sample Commands to Practice—Page 2
EXTREME NETWORKS EDUCATION AND TRAINING

Reset the Switch 3. Answer NO to the following failsafe prompts while play-
ing in the sandbox:
At the command line prompt type: unconfigure switch all
Restore all factory defaults and reboot?
(y/N) yes Changing the default failsafe account user-
name and password is highly recommended. If
1. Wait, do not try to login at this AAA prompt: (pending- you choose to do so, please remember the
AAA) login: username and password as this information
When you see Authentication Service (AAA) on cannot be recovered by Extreme Networks.
the master node is now available for login, now Would you like to change the failsafe ac-
you’re on the switch. Press the Enter key and login. count username and password now? [y/N]: No
login: admin
Would you like to permit failsafe account
password: {no password, just press the Enter key}
access via the management port? [y/N]: No
2. Enter Yes to the following three prompts, especially -
ensure all ports are disabled. Since you have chosen less secure manage-
ment methods, please remember to increase
the security of your network by taking the
following actions:
Press the <tab> or ‘?’ key at any time for
completions. * change your admin password
Remember to save your configuration changes. * change your failsafe account username and
password
This switch currently has all management
methods enabled for convenience reasons.
Please answer these questions about the
security settings you would like to use. 4. DO NOT make any changes to the login credentials as
Telnet is enabled by default. Telnet is suggested above while playing on the switch! Do not do
unencrypted and has been the target of anything to disable/impair the switches’ use by others!
security exploits in the past.

Would you like to disable Telnet? [y/N]: Yes Sample Commands to Practice
Disabling telnet access...done Now the switch is ready for use. Here are some commands
to get you started:
SNMP access is enabled by default. SNMP
uses no encryption, SNMPv3 can be configured
to eliminate this problem. show switch
show session
Would you like to disable SNMP? [y/N]: Yes show management
show vlan
Disabling all SNMP access...done
show accounts
All ports are enabled by default. In some show ports (use ESC to come back out of this one)
secure applications, it maybe more desirable show ospf
for the ports to be turned off.
ls
Would you like unconfigured ports turned off history
by default?[y/N]: Yes configure snmp sysname MYswitch
create vlan blue
Disabling all ports...done
show vlan
show vlan blue
configure vlan blue ipaddress 192.168.100.111/24
show vlan

© 2009 Extreme Networks, Inc. All rights reserved. Single Switch Access Instructions and Sample Commands to Practice—Page 3
EXTREME NETWORKS EDUCATION AND TRAINING

Download Additional Extreme Networks


Reference Materials
Command Line Reference Guide: ExtremeXOS Command
Reference Software Version 12.1 (10M ZIP) at: http://www.
extremenetworks.com/libraries/services/ExtremeXOSCom-
mandReferenceSoftwareVersion12-1-2-100273.zip

ExtremeXOS Concepts Guide: ExtremeXOS Concepts


Guide Software Version 12.1 (14M ZIP) at: http://www.
extremenetworks.com/libraries/services/ExtremeXOSCon-
ceptsGuideSoftwareVersion12-1-2-100272.zip

Hands-on Classes Available


Would you like to learn more about ExtremeXOS in a
structured environment? Attend a hands-on class! Go to
Extreme Networks technical training page for more infor-
mation at: www.extremenetworks.com/go/training.htm

*PuTTY is copyright 1997-2009 Simon Tatham.


Portions copyright Robert de Bath, Joris van Rantwijk, Delian Delchev, An-
dreas Schultz, Jeroen Massar, Wez Furlong, Nicolas Barry, Justin Bradford,
Ben Harris, Malcolm Smith, Ahmad Khalifa, Markus Kuhn, Colin Watson, and
CORE SDI S.A.

Permission is hereby granted, free of charge, to any person obtaining a copy


of this software and associated documentation files (the “Software”), to deal in
the Software without restriction, including without limitation the rights to use,
copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the
Software, and to permit persons to whom the Software is furnished to do so,
subject to the following conditions:

The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.

© 2009 Extreme Networks, Inc. All rights reserved. Extreme Networks, the Extreme Networks logo and ExtremeXOS are either
registered trademarks or trademarks of Extreme Networks, Inc. in the United States and/or other countries. Specifications are
subject to change without notice. 1580_01 07/09

Das könnte Ihnen auch gefallen