<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Extreme AP Reboot Schedule in ExtremeWireless (Identifi)</title>
    <link>https://community.extremenetworks.com/t5/extremewireless-identifi/extreme-ap-reboot-schedule/m-p/44049#M3627</link>
    <description>I have a more complex one, but here is a simple little script.&lt;BR /&gt;
&lt;BR /&gt;
#!/usr/bin/expect -f&lt;BR /&gt;
set f [open "aps"]&lt;BR /&gt;
set data [read $f]&lt;BR /&gt;
close $f&lt;BR /&gt;
&lt;BR /&gt;
foreach line [split $data \n] {&lt;BR /&gt;
spawn ssh -o "StrictHostKeyChecking no" admin@$line&lt;BR /&gt;
expect "password: "&lt;BR /&gt;
send "new2day\r"&lt;BR /&gt;
expect "\*# "&lt;BR /&gt;
send -- "reboot\r"&lt;BR /&gt;
send -- "exit\r"&lt;BR /&gt;
sleep 30&lt;BR /&gt;
expect eof&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
aps is a file with a list of IP addresses such as&lt;BR /&gt;
10.3.1.1&lt;BR /&gt;
10.3.1.2&lt;BR /&gt;
10.3.1.3&lt;BR /&gt;
&lt;BR /&gt;
new2day is the default AP password.  We have changed ours, but whatever works.&lt;BR /&gt;
&lt;BR /&gt;</description>
    <pubDate>Wed, 11 Nov 2015 04:47:00 GMT</pubDate>
    <dc:creator>Jeremy_Gibbs</dc:creator>
    <dc:date>2015-11-11T04:47:00Z</dc:date>
    <item>
      <title>Extreme AP Reboot Schedule</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-identifi/extreme-ap-reboot-schedule/m-p/44046#M3624</link>
      <description>&lt;B&gt;&lt;I&gt;How to create a reboot  schedule for Extreme Networks Identify AP’s&lt;/I&gt;&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
    &lt;B&gt;&lt;I&gt; &lt;/I&gt;&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
    1.        Log into the controller via SSH&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    2.        Input the username and password for the  controller (same as the web GUI login). Then after login type &lt;B&gt;&lt;I&gt;shell&lt;/I&gt;&lt;/B&gt;.  Enter the password that you used to log into the controller.&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    3.        On  the controller, run '&lt;B&gt;&lt;I&gt;ssh-keygen&lt;/I&gt;&lt;/B&gt;’ and go through the  prompts to create a public (id_rsa.pub) and private (id_rsa) keypair for use  with authentication. These get dumped into a .ssh folder in the user's  directory (in this case, root, so /root). There's an option to apply a  passphrase to the private key, but opted not to do it, as it would have to be  put in before connecting (basically, it provides the option to provide a  password locally to unlock a key instead of sending a password over the network  for authentication)&lt;BR /&gt;
&lt;BR /&gt;
    After running &lt;B&gt;&lt;I&gt;ssh-keygen &lt;/I&gt;&lt;/B&gt;you will get a pblic key  similar to this. Example:&lt;BR /&gt;
&lt;BR /&gt;
    “&lt;B&gt;&lt;I&gt;ssh-rsaAAAAB3NzaC1yc2EAAAABIwAAAQEA+1JVD+Vm7zvTc8A7tfyzoYeUEmurWdizPlMbi6KDxm.gifsW4n/XaDNNnIMXUTdg4qEpXxS/xEyyp02XMN3S7bnC5WvlL8qAZE4derZzoob4o6cwlohah/m2xVxDw5qhHyUKzB4NF8DTLxbCJ9fqHGvxxj/+4hs9+JUDBxYygrG6AKNtEW4KWIGCoyNO2SOtZM1VeXopidwwK6xsN11CNYujeIqOOkmwtYy7Z7evVZ+1hiQIeTedF+Nu330aQedQnH1E8iaip3RRg7Lup1u+I3LfluKC+sb6QzO6dCJ8ITJyYzstkAdERbNK7EwrVB55S5DsjrflRLFt2ZxN66uIJQ==  root@EWC.extremenetworks.com&lt;/I&gt;&lt;/B&gt;”&lt;BR /&gt;
&lt;BR /&gt;
    4.        Then you need to create the ssh script&lt;BR /&gt;
&lt;BR /&gt;
    5.        Type &lt;B&gt;&lt;I&gt;cd /root &lt;/I&gt;&lt;/B&gt;to change directory to the  root folder and then create script. Type &lt;B&gt;&lt;I&gt;vi rebootap.sh&lt;/I&gt;&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
    6.        This will place you in the vi console. Now type  your script. You need an entry for every AP (ex.)&lt;BR /&gt;
&lt;BR /&gt;
    #!/bin/bash&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    ssh  &lt;A href="https://mailto:admin@10.10.22.2" target="_blank" rel="nofollow noreferrer noopener"&gt;admin@10.10.22.2&lt;/A&gt;  "/sbin/reboot"&lt;BR /&gt;
&lt;BR /&gt;
    ssh  &lt;A href="https://mailto:admin@10.10.22.3" target="_blank" rel="nofollow noreferrer noopener"&gt;admin@10.10.22.3&lt;/A&gt;  "/sbin/reboot"&lt;BR /&gt;
&lt;BR /&gt;
    ssh  &lt;A href="https://mailto:admin@10.10.22.4" target="_blank" rel="nofollow noreferrer noopener"&gt;admin@10.10.22.4&lt;/A&gt;  "/sbin/reboot"&lt;BR /&gt;
&lt;BR /&gt;
    ssh  &lt;A href="https://mailto:admin@10.10.22.5" target="_blank" rel="nofollow noreferrer noopener"&gt;admin@10.10.22.5&lt;/A&gt;  "/sbin/reboot"&lt;BR /&gt;
&lt;BR /&gt;
    ssh  &lt;A href="https://mailto:admin@10.10.22.6" target="_blank" rel="nofollow noreferrer noopener"&gt;admin@10.10.22.6&lt;/A&gt;  "/sbin/reboot"&lt;BR /&gt;
&lt;BR /&gt;
    ssh  &lt;A href="https://mailto:admin@10.10.22.7" target="_blank" rel="nofollow noreferrer noopener"&gt;admin@10.10.22.7&lt;/A&gt;  "/sbin/reboot"&lt;BR /&gt;
&lt;BR /&gt;
    ssh  &lt;A href="https://mailto:admin@10.10.22.8" target="_blank" rel="nofollow noreferrer noopener"&gt;admin@10.10.22.8&lt;/A&gt;  "/sbin/reboot"&lt;BR /&gt;
&lt;BR /&gt;
    ssh  &lt;A href="https://mailto:admin@10.10.22.9" target="_blank" rel="nofollow noreferrer noopener"&gt;admin@10.10.22.9&lt;/A&gt;  "/sbin/reboot"&lt;BR /&gt;
&lt;BR /&gt;
    ssh  &lt;A href="https://mailto:admin@10.10.22.10" target="_blank" rel="nofollow noreferrer noopener"&gt;admin@10.10.22.10&lt;/A&gt;  "/sbin/reboot"&lt;BR /&gt;
&lt;BR /&gt;
    ssh  &lt;A href="https://mailto:admin@192.168.104.20" target="_blank" rel="nofollow noreferrer noopener"&gt;admin@192.168.104.20&lt;/A&gt;  "/sbin/reboot"&lt;BR /&gt;
&lt;BR /&gt;
    ssh  &lt;A href="https://mailto:admin@192.168.104.73" target="_blank" rel="nofollow noreferrer noopener"&gt;admin@192.168.104.73&lt;/A&gt;  "/sbin/reboot"&lt;BR /&gt;
&lt;BR /&gt;
    ssh  &lt;A href="https://mailto:admin@192.168.104.25" target="_blank" rel="nofollow noreferrer noopener"&gt;admin@192.168.104.25&lt;/A&gt;  "/sbin/reboot"&lt;BR /&gt;
&lt;BR /&gt;
    ssh  &lt;A href="https://mailto:admin@192.168.104.80" target="_blank" rel="nofollow noreferrer noopener"&gt;admin@192.168.104.80&lt;/A&gt;  "/sbin/reboot"&lt;BR /&gt;
&lt;BR /&gt;
    ssh  &lt;A href="https://mailto:admin@192.168.104.72" target="_blank" rel="nofollow noreferrer noopener"&gt;admin@192.168.104.72&lt;/A&gt;  "/sbin/reboot"&lt;BR /&gt;
&lt;BR /&gt;
    ssh  &lt;A href="https://mailto:admin@192.168.104.23" target="_blank" rel="nofollow noreferrer noopener"&gt;admin@192.168.104.23&lt;/A&gt;  "/sbin/reboot"&lt;BR /&gt;
&lt;BR /&gt;
    ssh  &lt;A href="https://mailto:admin@192.168.104.79" target="_blank" rel="nofollow noreferrer noopener"&gt;admin@192.168.104.79&lt;/A&gt;  "/sbin/reboot"&lt;BR /&gt;
&lt;BR /&gt;
    ssh  &lt;A href="https://mailto:admin@192.168.104.28" target="_blank" rel="nofollow noreferrer noopener"&gt;admin@192.168.104.28&lt;/A&gt;  "/sbin/reboot"&lt;BR /&gt;
&lt;BR /&gt;
    ssh  &lt;A href="https://mailto:admin@192.168.104.82" target="_blank" rel="nofollow noreferrer noopener"&gt;admin@192.168.104.82&lt;/A&gt;  "/sbin/reboot"&lt;BR /&gt;
&lt;BR /&gt;
    ssh  &lt;A href="https://mailto:admin@192.168.104.76" target="_blank" rel="nofollow noreferrer noopener"&gt;admin@192.168.104.76&lt;/A&gt;  "/sbin/reboot"&lt;BR /&gt;
&lt;BR /&gt;
    ssh  &lt;A href="https://mailto:admin@192.168.104.75" target="_blank" rel="nofollow noreferrer noopener"&gt;admin@192.168.104.75&lt;/A&gt;  "/sbin/reboot"&lt;BR /&gt;
&lt;BR /&gt;
    7.       Then hit the &lt;B&gt;&lt;I&gt;esc&lt;/I&gt;&lt;/B&gt; button and then type &lt;B&gt;&lt;I&gt;ctrl+q&lt;/I&gt;&lt;/B&gt;  then &lt;B&gt;&lt;I&gt;w&lt;/I&gt;&lt;/B&gt;  then &lt;B&gt;&lt;I&gt;q&lt;/I&gt;&lt;/B&gt;  then &lt;B&gt;!&lt;/B&gt; (This will write, save, and  quit the file in vi&lt;BR /&gt;
&lt;BR /&gt;
    8.       Now ssh into every AP and paste this  command &lt;BR /&gt;
&lt;BR /&gt;
    On each AP, we created a folder .ssh  in /root, and created a file inside called 'authorized_keys', in which we put  the contents of the controller's id_rsa.pub file. When connecting via SSH, the  combo of the controller's private key and public key in the authorized_keys  file will complete the authentication without the need for a password.&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    One thing to note is that for each  device you connect to, if it's the first time, it'll prompt you with a message  about the host fingerprint, e.g.:&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    The authenticity of host  'my.computer.local (xx.xx.xx.xx)' can't be established.&lt;BR /&gt;
&lt;BR /&gt;
    RSA key fingerprint is  6a??e0??56:f8:0c:04:11:5b:ef:4d:49??09:23.&lt;BR /&gt;
&lt;BR /&gt;
    Are you sure you want to continue  connecting (yes/no)?&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    When you continue connecting, that  key/hostname/ip combo gets put in the controller's 'known_hosts' file, also in  the .ssh directory. Subsequent connections verify that the host fingerprint  matches (to prevent man-in-the-middle attacks); if the host you're connecting  to has had OpenSSH reinstalled (due to format, etc.), the fingerprint will  probably change, no longer match, and fail to connect. You would need to edit  the 'known_hosts' file and remove the old entry&lt;B&gt;&lt;I&gt;  &lt;/I&gt;&lt;/B&gt;(This will allow the controller to  SSH into the AP without a password)&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    To  do this, you would take the key that was created in &lt;B&gt;&lt;I&gt;ssh-keygen&lt;/I&gt;&lt;/B&gt; and place it  into this small script that you can copy and paste after you ssh into the  AP.Example:&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    &lt;B&gt;&lt;I&gt;mkdir  .ssh&lt;/I&gt;&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
    &lt;B&gt;&lt;I&gt;echo  "ssh-rsaAAAAB3NzaC1yc2EAAAABIwAAAQEA+1JVD&lt;/I&gt;&lt;/B&gt;&lt;B&gt;&lt;I&gt;+Vm7zvTc8A7tfyzoYeUEmurWdizPlMbi6KDxm.gifsW4n/XaDNNnIMXUTdg4qEpXxS/xEyyp02XMN3S7bnC5WvlL8qAZE4derZzoob4o6cwlohah/m2xVxDw5qhHyUKz&lt;/I&gt;&lt;/B&gt;&lt;B&gt;&lt;I&gt;B4NF8DTLxbCJ9fqHGvxxj/+4hs9+JUDBxYygrG6AKNtEW4KWIGCoyNO2SOtZM1VeXopidwwK6xsN11CNYujeIqOOkmwtYy7Z7evVZ+1hiQIeTedF+Nu330aQedQnH1E8iaip3RRg7Lup1u+I3LfluKC+sb6QzO6dCJ8ITJyYzstkAdERbNK7EwrVB55S5DsjrflRLFt2ZxN66uIJQ==  root@EWC.extremenetworks.com"  &amp;gt; .ssh/authorized_keys&lt;/I&gt;&lt;/B&gt;    &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;&lt;I&gt;exit&lt;/I&gt;&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    9.       Now lets create the cronjob on the  controller&lt;BR /&gt;
&lt;BR /&gt;
    Type  crontab –e “0 1 * * * /root/rebootap.sh”&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    This will create the reboot schedule  and will reboot the AP’s at 1am every day. The schedule can be edited on an as  per needed basis.&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    &lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 11 Nov 2015 04:28:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-identifi/extreme-ap-reboot-schedule/m-p/44046#M3624</guid>
      <dc:creator>Joseph_Burnswor</dc:creator>
      <dc:date>2015-11-11T04:28:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme AP Reboot Schedule</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-identifi/extreme-ap-reboot-schedule/m-p/44047#M3625</link>
      <description>If you don't want to create ssh-keys, use expect!  I have written a script to do this for me as well because I am lazy.  Mine staggers the reboots after randomizing the IP addresses, that way I don't take to many APs down in one area at any given time.</description>
      <pubDate>Wed, 11 Nov 2015 04:32:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-identifi/extreme-ap-reboot-schedule/m-p/44047#M3625</guid>
      <dc:creator>Jeremy_Gibbs</dc:creator>
      <dc:date>2015-11-11T04:32:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme AP Reboot Schedule</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-identifi/extreme-ap-reboot-schedule/m-p/44048#M3626</link>
      <description>That is good to know, I'll have to try that &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 11 Nov 2015 04:36:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-identifi/extreme-ap-reboot-schedule/m-p/44048#M3626</guid>
      <dc:creator>Joseph_Burnswor</dc:creator>
      <dc:date>2015-11-11T04:36:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme AP Reboot Schedule</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-identifi/extreme-ap-reboot-schedule/m-p/44049#M3627</link>
      <description>I have a more complex one, but here is a simple little script.&lt;BR /&gt;
&lt;BR /&gt;
#!/usr/bin/expect -f&lt;BR /&gt;
set f [open "aps"]&lt;BR /&gt;
set data [read $f]&lt;BR /&gt;
close $f&lt;BR /&gt;
&lt;BR /&gt;
foreach line [split $data \n] {&lt;BR /&gt;
spawn ssh -o "StrictHostKeyChecking no" admin@$line&lt;BR /&gt;
expect "password: "&lt;BR /&gt;
send "new2day\r"&lt;BR /&gt;
expect "\*# "&lt;BR /&gt;
send -- "reboot\r"&lt;BR /&gt;
send -- "exit\r"&lt;BR /&gt;
sleep 30&lt;BR /&gt;
expect eof&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
aps is a file with a list of IP addresses such as&lt;BR /&gt;
10.3.1.1&lt;BR /&gt;
10.3.1.2&lt;BR /&gt;
10.3.1.3&lt;BR /&gt;
&lt;BR /&gt;
new2day is the default AP password.  We have changed ours, but whatever works.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 11 Nov 2015 04:47:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-identifi/extreme-ap-reboot-schedule/m-p/44049#M3627</guid>
      <dc:creator>Jeremy_Gibbs</dc:creator>
      <dc:date>2015-11-11T04:47:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme AP Reboot Schedule</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-identifi/extreme-ap-reboot-schedule/m-p/44050#M3628</link>
      <description>That's a lot simpler than mine. I like it&lt;BR /&gt;</description>
      <pubDate>Wed, 11 Nov 2015 04:55:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-identifi/extreme-ap-reboot-schedule/m-p/44050#M3628</guid>
      <dc:creator>Joseph_Burnswor</dc:creator>
      <dc:date>2015-11-11T04:55:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme AP Reboot Schedule</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-identifi/extreme-ap-reboot-schedule/m-p/44051#M3629</link>
      <description>Also as of 9.21.xx code.... &lt;A href="https://gtacknowledge.extremenetworks.com/articles/Q_A/On-the-IdentiFi-Appliance-can-I-schedule-all-my-access-points-to-reset" target="_blank" rel="nofollow noreferrer noopener"&gt;https://gtacknowledge.extremenetworks.com/articles/Q_A/On-the-IdentiFi-Appliance-can-I-schedule-all-...&lt;/A&gt;</description>
      <pubDate>Thu, 12 Nov 2015 00:19:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-identifi/extreme-ap-reboot-schedule/m-p/44051#M3629</guid>
      <dc:creator>Doug</dc:creator>
      <dc:date>2015-11-12T00:19:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme AP Reboot Schedule</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-identifi/extreme-ap-reboot-schedule/m-p/44052#M3630</link>
      <description>Please note, we typically don't suggest access to the ap shell  unless it's for debugging reasons. When gaining access to the shell we  specifically note at the login prompt: &lt;B&gt;"AP3805e 09.21.04.0007 interactive shell for  service personnel only"&lt;/B&gt;Scripts accessing the shell or any modifications to an ap via  shell would not be supported if any issues arise. &lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 12 Nov 2015 19:56:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-identifi/extreme-ap-reboot-schedule/m-p/44052#M3630</guid>
      <dc:creator>Doug</dc:creator>
      <dc:date>2015-11-12T19:56:00Z</dc:date>
    </item>
  </channel>
</rss>

