beautypg.com

H3C Technologies H3C S6300 Series Switches User Manual

Page 13

background image

vii

Establishing a connection to an SFTP server ···································································································· 278

 

Working with SFTP directories ··························································································································· 280

 

Working with SFTP files ······································································································································ 280

 

Displaying help information ······························································································································· 280

 

Terminating the connection with the SFTP server ····························································································· 281

 

Configuring the device as an SCP client ··················································································································· 281

 

Displaying and maintaining SSH ······························································································································· 283

 

Stelnet configuration examples ··································································································································· 283

 

Password authentication enabled Stelnet server configuration example ······················································ 283

 

Publickey authentication enabled Stelnet server configuration example ······················································· 286

 

Password authentication enabled Stelnet client configuration example ························································ 291

 

Publickey authentication enabled Stelnet client configuration example ························································ 294

 

SFTP configuration examples ······································································································································ 296

 

Password authentication enabled SFTP server configuration example ·························································· 296

 

Publickey authentication enabled SFTP client configuration example ··························································· 298

 

SCP configuration examples ······································································································································· 302

 

Network requirements ········································································································································· 302

 

Configuration procedure ···································································································································· 302

 

NETCONF over SSH configuration example with password authentication ························································ 303

 

Network requirements ········································································································································· 304

 

Configuration procedure ···································································································································· 304

 

Verifying the configuration ································································································································· 305

 

Configuring SSL ······················································································································································· 306

 

Overview ······································································································································································· 306

 

SSL security services ············································································································································ 306

 

SSL protocol stack ··············································································································································· 306

 

FIPS compliance ··························································································································································· 307

 

SSL configuration task list ············································································································································ 307

 

Configuring an SSL server policy ······························································································································· 307

 

Configuring an SSL client policy ································································································································ 309

 

Displaying and maintaining SSL ································································································································· 310

 

Configuring IP source guard ·································································································································· 311

 

Overview ······································································································································································· 311

 

Static IP source guard binding entries ··············································································································· 311

 

Dynamic IP source guard binding entries ········································································································· 312

 

IP source guard configuration task list ······················································································································· 312

 

Configuring the IPv4 source guard feature ··············································································································· 313

 

Enabling IPv4 source guard on an interface ···································································································· 313

 

Configuring a static IPv4 source guard binding entry····················································································· 313

 

Configuring the IPv6 source guard feature ··············································································································· 314

 

Enabling IPv6 source guard on an interface ···································································································· 314

 

Configuring a static IPv6 source guard binding entry····················································································· 315

 

Displaying and maintaining IP source guard ············································································································ 316

 

IP source guard configuration examples ··················································································································· 316

 

Static IPv4 source guard configuration example ····························································································· 316

 

Dynamic IPv4 source guard using DHCP snooping configuration example ················································· 318

 

Dynamic IPv4 source guard using DHCP relay configuration example ························································ 319

 

Static IPv6 source guard configuration example ····························································································· 320

 

Dynamic IPv6 source guard using DHCPv6 snooping configuration example ············································· 320

 

Configuring ARP attack protection ························································································································· 322

 

ARP attack protection configuration task list ············································································································· 322

 

Configuring unresolvable IP attack protection ·········································································································· 322

 

Configuring ARP source suppression ················································································································ 323