ix
Stelnet client configuration task list ········································································································ 356
Specifying a source IP address or source interface for the Stelnet client ·············································· 356
Enabling and disabling first-time authentication ····················································································· 357
Establishing a connection to an Stelnet server ······················································································ 358
Configuring the device as an SFTP client ······································································································ 358
SFTP client configuration task list ·········································································································· 359
Specifying a source IP address or source interface for the SFTP client ················································ 359
Establishing a connection to an SFTP server ························································································ 359
Working with SFTP directories ··············································································································· 360
Working with SFTP files ························································································································· 361
Displaying help information ···················································································································· 362
Terminating the connection with the SFTP server ················································································· 362
Configuring the device as an SCP client ········································································································ 362
SCP client configuration task list ············································································································ 362
Transferring files with an SCP server ····································································································· 363
Displaying and maintaining SSH ···················································································································· 363
Stelnet configuration examples ······················································································································ 364
Password authentication enabled Stelnet server configuration example ··············································· 364
Publickey authentication enabled Stelnet server configuration example ··············································· 366
Password authentication enabled Stelnet client configuration example ················································ 371
Publickey authentication enabled Stelnet client configuration example ················································· 374
SFTP configuration examples ················································································································ 376
Password authentication enabled SFTP server configuration example ················································· 376
Publickey authentication enabled SFTP client configuration example ··················································· 378
SCP configuration example ··························································································································· 381
Network requirements ···························································································································· 381
Configuration procedure ························································································································· 382
Configuring SSL ·························································································· 384
Overview ························································································································································ 384
SSL security mechanism ························································································································ 384
SSL protocol stack ································································································································· 384
FIPS compliance ············································································································································ 385
Configuration task list ····································································································································· 385
Configuring an SSL server policy ··················································································································· 386
Configuring an SSL client policy ···················································································································· 387
Displaying and maintaining SSL ···················································································································· 388
SSL server policy configuration example ······································································································· 388
Troubleshooting SSL ····································································································································· 390
SSL handshake failure ··························································································································· 390
Configuring SSL VPN ················································································· 392
Configuration procedure ································································································································ 393
SSL VPN configuration example ···················································································································· 393
Configuring a user profile ············································································ 397
Overview ························································································································································ 397
Configuration restrictions and guidelines ······································································································· 397
User profile configuration task list ·················································································································· 397
Creating a user profile ···································································································································· 397
Performing configurations in user profile view ······························································································· 398
Enabling a user profile ··································································································································· 398
Displaying and maintaining user profile ········································································································· 398
Configuring ARP attack protection ······························································ 399
Overview ························································································································································ 399
ARP attack protection configuration task list ·································································································· 399
Configuring unresolvable IP attack protection ······························································································· 399
Configuring ARP source suppression ···································································································· 400
Displaying and maintaining ARP source suppression············································································ 400
Configuration example ··························································································································· 400
Configuring source MAC-based ARP attack detection ·················································································· 401