Table of Contents
35.4.3 Sub-Option Format .................................................................................................313
35.6 DHCPv6 LDRA .................................................................................................................321
35.6.1 DHCPv6 Counter ....................................................................................................324
35.6.2 Snooping Configure ................................................................................................324
Chapter 36
Maintenance .......................................................................................................................... 327
36.2 Firmware Upgrade ...........................................................................................................328
36.5 Load Factory Default .......................................................................................................330
36.6 Save Configuration ...........................................................................................................331
36.7 Reboot System .................................................................................................................331
36.8 FTP Command Line .........................................................................................................331
36.8.4 FTP Restrictions ....................................................................................................333
Chapter 37
Access Control ..................................................................................................................... 334
37.3.2 Supported MIBs ......................................................................................................336
37.3.3 SNMP Traps ...........................................................................................................336
37.3.4 Configuring SNMP .................................................................................................342
37.4 SSH Overview ..................................................................................................................346
37.5 How SSH works ...............................................................................................................346
37.7 Introduction to HTTPS ......................................................................................................347
37.8 HTTPS Example ..............................................................................................................348
14
................................................................................318
..................................................................................................................334
............................................................................344
.................................................................................344
VES1724-56 User's Guide