Chapter 32 Access Control
GS1915 Series User’s Guide
273
32.8.2 SSH Overview
Unlike Telnet or FTP, which transmit data in clear text, SSH (Secure Shell) is a secure communication
protocol that combines authentication and data encryption to provide secure encrypted
communication between two hosts over an unsecured network.
Figure 196
SSH Communication Example
32.8.2.1 How SSH Works
The following table summarizes how a secure connection is established between two remote hosts.
Table 145 SNMP Switch Traps
OPTION
OBJECT LABEL
OBJECT ID
DESCRIPTION
stp
STPNewRoot
1.3.6.1.2.1.17.0.1
This trap is sent when the STP root switch
changes.
STPTopologyChange
1.3.6.1.2.1.17.0.2
This trap is sent when the STP topology
changes.
rmon
RmonRisingAlarm
1.3.6.1.2.1.16.0.1
This trap is sent when a variable goes over
the RMON "rising" threshold.
RmonFallingAlarm
1.3.6.1.2.1.16.0.2
This trap is sent when the variable falls below
the RMON "falling" threshold.