
Software Reference for x310 Series Switches
C613-50046-01 REV A AlliedWare Plus
TM
Operating System - Version 5.4.4C xv
Chapter 52: Secure Shell (SSH) Introduction
Introduction.................................................................................................................................................................... 52.2
Secure Shell on the AlliedWare Plus
OS.........................................................................................................52.2
Configuring the SSH Server ......................................................................................................................................52.4
Creating a Host Key...............................................................................................................................................52.4
Enabling the Server............................................................................................................................................... 52.4
Modifying the Server............................................................................................................................................52.5
Validating the Server Configuration...............................................................................................................52.6
Adding SSH Users .................................................................................................................................................. 52.6
Authenticating SSH Users...................................................................................................................................52.7
Adding a Login Banner........................................................................................................................................ 52.7
Monitoring the Server and Managing Sessions.......................................................................................... 52.8
Debugging the Server.......................................................................................................................................... 52.8
Configuring the SSH Client .......................................................................................................................................52.9
Modifying the Client.............................................................................................................................................52.9
Adding SSH Servers ............................................................................................................................................52.10
Authenticating with a Server...........................................................................................................................52.10
Connecting to a Server and Running Commands...................................................................................52.11
Copying files to and from the Server............................................................................................................52.11
Debugging the Client ........................................................................................................................................52.11
Chapter 53: Secure Shell (SSH) Configuration
SSH Server Configuration Example........................................................................................................................53.2
Chapter 54: Secure Shell (SSH) Commands
Introduction.................................................................................................................................................................... 54.2
Command List................................................................................................................................................................54.2
Chapter 55: DHCP Snooping Introduction and Configuration
Introduction.................................................................................................................................................................... 55.2
DHCP Snooping.............................................................................................................................................................55.2
DHCP Snooping Database..................................................................................................................................55.3
DHCP Relay Agent Option 82............................................................................................................................55.4
Traffic Filtering with DHCP Snooping ............................................................................................................55.6
ARP Security.............................................................................................................................................................55.8
MAC Address Verification ................................................................................................................................... 55.8
DHCP Snooping Violations................................................................................................................................. 55.8
Interactions with Other Features ............................................................................................................................55.9
Configuration...............................................................................................................................................................55.10
Configure DHCP Snooping...............................................................................................................................55.10
Disabling DHCP Snooping................................................................................................................................55.16
Related Features ..................................................................................................................................................55.16
Chapter 56: DHCP Snooping Commands
Command List................................................................................................................................................................ 56.2
Comentarios a estos manuales