iv
Configuring the macAddressElseUserLoginSecure Mode ····························································6-17
Troubleshooting Port Security···············································································································6-19
Cannot Set the Port Security Mode·······························································································6-19
Cannot Configure Secure MAC Addresses···················································································6-20
Cannot Change Port Security Mode When a User Is Online ························································6-20
7 IP Source Guard Configuration················································································································7-1
IP Source Guard Overview ·····················································································································7-1
Configuring a Static Binding Entry ··········································································································7-1
Configuring Dynamic Binding Function···································································································7-2
Displaying and Maintaining IP Source Guard ·························································································7-3
IP Source Guard Configuration Examples ······························································································7-3
Static Binding Entry Configuration Example····················································································7-3
Dynamic Binding Function Configuration Example ·········································································7-4
Troubleshooting IP Source Guard ··········································································································7-6
Failed to Configure Static Binding Entries and Dynamic Binding Function·····································7-6
8 SSH2.0 Configuration································································································································8-1
SSH2.0 Overview····································································································································8-1
Introduction to SSH2.0 ····················································································································8-1
Operation of SSH ····························································································································8-1
Configuring the Device as an SSH Server······························································································8-4
SSH Server Configuration Task List································································································8-4
Generating a DSA or RSA Key Pair ································································································8-4
Enabling SSH Server·······················································································································8-5
Configuring the User Interfaces for SSH Clients·············································································8-5
Configuring a Client Public Key·······································································································8-6
Configuring an SSH User ················································································································8-7
Setting the SSH Management Parameters ·····················································································8-8
Configuring the Device as an SSH Client ·······························································································8-9
SSH Client Configuration Task List ·································································································8-9
Specifying a Source IP address/Interface for the SSH client ··························································8-9
Configuring Whether First-time Authentication is Supported ························································8-10
Establishing a Connection Between the SSH Client and the Server ············································8-11
Displaying and Maintaining SSH···········································································································8-11
SSH Server Configuration Examples····································································································8-12
When Switch Acts as Server for Password Authentication ···························································8-12
When Switch Acts as Server for Publickey Authentication ···························································8-14
SSH Client Configuration Examples ·····································································································8-19
When Switch Acts as Client for Password Authentication ····························································8-19
When Switch Acts as Client for Publickey Authentication·····························································8-22
9 SFTP Configuration ···································································································································9-1
SFTP Overview ·······································································································································9-1
Configuring an SFTP Server···················································································································9-1
Configuration Prerequisites ·············································································································9-1
Enabling the SFTP Server···············································································································9-1
Configuring the SFTP Connection Idle Timeout Period ··································································9-2
Configuring an SFTP Client ····················································································································9-2
Specifying a Source IP Address or Interface for the SFTP Client···················································9-2