Allied Telesis AlliedWare Plus Operating System Version 5.4.4C (x310-26FT,x310-26FP,x310-50FT,x310-50FP) User Manual
Page 15
Software Reference for x310 Series Switches
C613-50046-01 REV A
AlliedWare Plus
TM
Operating System - Version 5.4.4C
xv
Secure Shell (SSH) Introduction
Secure Shell on the AlliedWare Plus
OS......................................................................................................... 52.2
Creating a Host Key............................................................................................................................................... 52.4
Enabling the Server............................................................................................................................................... 52.4
Modifying the Server............................................................................................................................................ 52.5
Validating the Server Configuration ............................................................................................................... 52.6
Adding SSH Users .................................................................................................................................................. 52.6
Authenticating SSH Users................................................................................................................................... 52.7
Adding a Login Banner........................................................................................................................................ 52.7
Monitoring the Server and Managing Sessions.......................................................................................... 52.8
Debugging the Server.......................................................................................................................................... 52.8
Modifying the Client............................................................................................................................................. 52.9
Adding SSH Servers ............................................................................................................................................52.10
Authenticating with a Server...........................................................................................................................52.10
Connecting to a Server and Running Commands ...................................................................................52.11
Copying files to and from the Server............................................................................................................52.11
Debugging the Client ........................................................................................................................................52.11
Secure Shell (SSH) Configuration
DHCP Snooping Introduction and Configuration
DHCP Snooping Database.................................................................................................................................. 55.3
DHCP Relay Agent Option 82............................................................................................................................ 55.4
Traffic Filtering with DHCP Snooping ............................................................................................................ 55.6
ARP Security............................................................................................................................................................. 55.8
MAC Address Verification ................................................................................................................................... 55.8
DHCP Snooping Violations................................................................................................................................. 55.8
Interactions with Other Features ............................................................................................................................ 55.9
Configuration...............................................................................................................................................................55.10
Configure DHCP Snooping...............................................................................................................................55.10
Disabling DHCP Snooping................................................................................................................................55.16
Related Features ..................................................................................................................................................55.16