Net Optics iBypass HD User Manual

Page 27

Advertising
background image

23

iBypass HD

To load a the iBypass HD configuration:
1. Type config load <filename> where <filename> is the name of a saved configuration.

The configuration is loaded.

2. Type commit.

The loaded filters are activated in the hardware.

To view a list of all saved the iBypass HD configurations:
• Type config list.

A list of the iBypass HD configurations is displayed.

To view a saved the iBypass HD configuration:
• Type config show <filename> where <filename> is the name of a saved configuration.

The configuration is displayed.

Manage the Security Key
Each iBypass HD unit is shipped with a unique RSA key for SSH communications with the CLI. The purpose of the RSA

key is to authenticate the iBypass HD appliance. For example, a hacker could hijack the IP addresses or domain name

assigned to the iBypass HD, and attempt to intercept your communications. However, the hacker cannot spoof the RSA key,

so you would get an "invalid identity key" or similar warning to alert you to this situation.

If you want, you can generate a new RSA key for the unit.
To generate a new SSH RSA key:
Type security gen-ssh type=ssh-rsa. A new RSA key for SSH communications with the CLI is generated. When users

next connect to the CLI over SSH, they will receive security warnings and need to enable their SSH clients for the new

RSA key. If you want, you can generate new RSA keys.

Use the CLI Command History Buffer
You can save some typing by using the command history buffer maintained by the CLI. The up- and down-arrow keys

scroll forward and backward through the history buffer. To execute a command again, simply scroll to that command

and press Enter. Alternately, you can scroll to a command and then edit it in-line before executing it. You can view a

list of all the buffered commands by entering the history command. Any command in the history buffer can be accessed

directly by entering !# where # is the number of the command in the buffer. Operation of the command history buffer is

illustrated in the following example.

Advertising