ix
Stelnet client configuration task list ········································································································ 356
Specifying a source IP address or source interface for the Stelnet client ·············································· 356
Enabling and disabling first-time authentication ····················································································· 357
Establishing a connection to an Stelnet server ······················································································ 358
Configuring the device as an SFTP client ······································································································ 358
SFTP client configuration task list ·········································································································· 359
Specifying a source IP address or source interface for the SFTP client ················································ 359
Establishing a connection to an SFTP server ························································································ 359
Working with SFTP directories ··············································································································· 360
Working with SFTP files ························································································································· 361
Displaying help information ···················································································································· 362
Terminating the connection with the SFTP server ················································································· 362
Configuring the device as an SCP client ········································································································ 362
SCP client configuration task list ············································································································ 362
Transferring files with an SCP server ····································································································· 363
Displaying and maintaining SSH ···················································································································· 363
Stelnet configuration examples ······················································································································ 364
Password authentication enabled Stelnet server configuration example ··············································· 364
Publickey authentication enabled Stelnet server configuration example ··············································· 366
Password authentication enabled Stelnet client configuration example ················································ 371
Publickey authentication enabled Stelnet client configuration example ················································· 374
SFTP configuration examples ················································································································ 376
Password authentication enabled SFTP server configuration example ················································· 376
Publickey authentication enabled SFTP client configuration example ··················································· 378
SCP configuration example ··························································································································· 381
Network requirements ···························································································································· 381
Configuration procedure ························································································································· 382
Configuring SSL ·························································································· 384
Overview ························································································································································ 384
SSL security mechanism ························································································································ 384
SSL protocol stack ································································································································· 384
FIPS compliance ············································································································································ 385
Configuration task list ····································································································································· 385
Configuring an SSL server policy ··················································································································· 386
Configuring an SSL client policy ···················································································································· 387
Displaying and maintaining SSL ···················································································································· 388
SSL server policy configuration example ······································································································· 388
Troubleshooting SSL ····································································································································· 390
SSL handshake failure ··························································································································· 390
Configuring SSL VPN ················································································· 392
Configuration procedure ································································································································ 393
SSL VPN configuration example ···················································································································· 393
Configuring a user profile ············································································ 397
Overview ························································································································································ 397
Configuration restrictions and guidelines ······································································································· 397
User profile configuration task list ·················································································································· 397
Creating a user profile ···································································································································· 397
Performing configurations in user profile view ······························································································· 398
Enabling a user profile ··································································································································· 398
Displaying and maintaining user profile ········································································································· 398
Configuring ARP attack protection ······························································ 399
Overview ························································································································································ 399
ARP attack protection configuration task list ·································································································· 399
Configuring unresolvable IP attack protection ······························································································· 399
Configuring ARP source suppression ···································································································· 400
Displaying and maintaining ARP source suppression············································································ 400
Configuration example ··························································································································· 400
Configuring source MAC-based ARP attack detection ·················································································· 401