cancel
Showing results for 
Search instead for 
Did you mean: 

Disable USB/eth ports on AP-8533 and 8432

Disable USB/eth ports on AP-8533 and 8432

Yoann
New Contributor
Hello guys,

I would like to know if it's possible to disable the USB, the second eth port and the eth PoE out port on AP 8432.
Same question goes for the AP 8533 (second eth port and console port to be disabled).

Thanks !
1 ACCEPTED SOLUTION

Christoph_S
Extreme Employee
Hello Yoann,

Here are your options:

SSH into the AP, virtual controller or controller and run the following commands:

>en
#conf t
#profile ap8432 default-ap8432 (replace profile name with your own, if different)
#interface usb 0
#shutdown
#..
#interface ge 2
#shutdown
#com wr

Don't think the console port can be disabled and it is not recommended to disable access to this port either, but if you so wish, you can limit admin access as such
#conf t
#management-policy default (replace policy name with your own if different)
#show context | grep password (to list your users. Next step would be to edit user access privileges)
#user admin password admin1234 role superuser access ?
all Allow all access
console Allow console access
ssh Allow ssh access
telnet Allow telnet access
web Allow web access
#user admin password admin1234 role superuser access ssh web
#com wr

Same commands can be used for both APs.

I hope this helps.

Thank you,

Chris
Christoph S.

View solution in original post

2 REPLIES 2

Yoann
New Contributor
Thank you Christoph.

Christoph_S
Extreme Employee
Hello Yoann,

Here are your options:

SSH into the AP, virtual controller or controller and run the following commands:

>en
#conf t
#profile ap8432 default-ap8432 (replace profile name with your own, if different)
#interface usb 0
#shutdown
#..
#interface ge 2
#shutdown
#com wr

Don't think the console port can be disabled and it is not recommended to disable access to this port either, but if you so wish, you can limit admin access as such
#conf t
#management-policy default (replace policy name with your own if different)
#show context | grep password (to list your users. Next step would be to edit user access privileges)
#user admin password admin1234 role superuser access ?
all Allow all access
console Allow console access
ssh Allow ssh access
telnet Allow telnet access
web Allow web access
#user admin password admin1234 role superuser access ssh web
#com wr

Same commands can be used for both APs.

I hope this helps.

Thank you,

Chris
Christoph S.
GTM-P2G8KFN