beautypg.com

Allied Telesis AlliedWare Plus Operating System Version 5.4.4C (x310-26FT,x310-26FP,x310-50FT,x310-50FP) User Manual

Page 15

background image

Software Reference for x310 Series Switches

C613-50046-01 REV A

AlliedWare Plus

TM

Operating System - Version 5.4.4C

xv

Chapter 52:

Secure Shell (SSH) Introduction

Introduction.................................................................................................................................................................... 52.2

Secure Shell on the AlliedWare Plus

OS......................................................................................................... 52.2

Configuring the SSH Server ...................................................................................................................................... 52.4

Creating a Host Key............................................................................................................................................... 52.4
Enabling the Server............................................................................................................................................... 52.4
Modifying the Server............................................................................................................................................ 52.5
Validating the Server Configuration ............................................................................................................... 52.6
Adding SSH Users .................................................................................................................................................. 52.6
Authenticating SSH Users................................................................................................................................... 52.7
Adding a Login Banner........................................................................................................................................ 52.7
Monitoring the Server and Managing Sessions.......................................................................................... 52.8
Debugging the Server.......................................................................................................................................... 52.8

Configuring the SSH Client ....................................................................................................................................... 52.9

Modifying the Client............................................................................................................................................. 52.9
Adding SSH Servers ............................................................................................................................................52.10
Authenticating with a Server...........................................................................................................................52.10
Connecting to a Server and Running Commands ...................................................................................52.11
Copying files to and from the Server............................................................................................................52.11
Debugging the Client ........................................................................................................................................52.11

Chapter 53:

Secure Shell (SSH) Configuration

SSH Server Configuration Example ........................................................................................................................ 53.2

Chapter 54:

Secure Shell (SSH) Commands

Introduction.................................................................................................................................................................... 54.2
Command List................................................................................................................................................................ 54.2

Chapter 55:

DHCP Snooping Introduction and Configuration

Introduction.................................................................................................................................................................... 55.2
DHCP Snooping............................................................................................................................................................. 55.2

DHCP Snooping Database.................................................................................................................................. 55.3
DHCP Relay Agent Option 82............................................................................................................................ 55.4
Traffic Filtering with DHCP Snooping ............................................................................................................ 55.6
ARP Security............................................................................................................................................................. 55.8
MAC Address Verification ................................................................................................................................... 55.8
DHCP Snooping Violations................................................................................................................................. 55.8

Interactions with Other Features ............................................................................................................................ 55.9
Configuration...............................................................................................................................................................55.10

Configure DHCP Snooping...............................................................................................................................55.10
Disabling DHCP Snooping................................................................................................................................55.16
Related Features ..................................................................................................................................................55.16

Chapter 56:

DHCP Snooping Commands

Command List................................................................................................................................................................ 56.2