I found a similar question here, but it was never answered:
I've been tasked to restrict local account access to console-only authentication on all the network equipment in our environment. For the Cisco, Arista, and Brocade equipment, I was able to accomplish this task. However for the Extreme Networks equipment, I cannot figure out how to do this.
For reference, I have an X450e-48p running ExtremeXOS v18.104.22.168.
In the Cisco equipment, I was able to to this:
aaa authentication login default group Mgmt
aaa authentication login ConsoleOnly local
line con 0
login authentication ConsoleOnly[/code]It was similary done w/ the Arista and Brocade equipment. As you can see in the example, the default login uses group Mgmt (which utilizes RADIUS). However, now with that configuration, when we connect via console, we MUST use a local login.
I know the Extreme Networks switch allows you to use a failsafe account and you can restrict that to console only, but it is my understanding that there must also be at least ONE administrator account configured on the switch.
With this, I cannot restrict console access, as the RADIUS accepted logins and the local administrator account is allowed to login via console.
Is this not do-able? Is there no way to lock down the console port access?