TP-Link T1600G-18TS Configuration Manual page 90

T1600g series
Hide thumbs Also See for T1600G-18TS:
Table of Contents

Advertisement

Managing System
Step 4
ip ssh timeout value
Specify the idle timeout time. The system will automatically release the connection when the
time is up.
value
value is 120 seconds.
Step 5
ip ssh max-client num
Specify the maximum number of the connections to the SSH server. New connection will not
be established when the number of the connections reaches the maximum number you set.
num
Step 6
ip ssh algorithm { AES128-CBC | AES192-CBC | AES256-CBC | Blowfish-CBC | Cast128-CBC |
3DES-CBC | HMAC-SHA1 | HMAC-MD5 }
Enable the corresponding algorithm. By default, these types are all enabled.
AES128-CBC | AES192-CBC | AES256-CBC | Blowfish-CBC | Cast128-CBC |
Specify the encryption algorithm you want the switch supports.
HMAC-SHA1 |
Step 7
ip ssh download { v1 | v2 } key-file ip-address ip-addr
Select the type of the key file and download the desired file to the switch from TFTP server.
v1 |
generation and authentication.
key-file
downloaded file is in the range of 512 to 3072 bits.
ip-addr
supported.
Step 8
show ip ssh
Verify the global configuration of SSH.
Step 9
end
Return to privileged EXEC mode.
Step 10
copy running-config startup-config
Save the settings in the configuration file.
Note:
It will take a long time to download the key file. Please wait without any operation.
The following example shows how to configure the SSH function. Set the version as SSH
V1 and SSH V2. Enable the AES128-CBC and Cast128-CBC encryption algorithm. Enable
the HMAC-MD5 data integrity algorithm. Choose the key type as SSH-2 RSA/DSA.
Switch(config)#ip ssh server
Switch(config)#ip ssh version v1
: Enter the value of the timeout time, which ranges from 1 to 120 seconds. The default
: Enter the number of the connections, which ranges from 1 to 5. The default value is 5.
HMAC-MD5: Specify the data integrity algorithm you want the switch supports.
v2: Select the key type. The algorithm of the corresponding type is used for both key
: Specify the name of the key file saved in TFTP server. Ensure the key length of the
: Specify the IP address of the TFTP server. Both IPv4 and IPv6 addresses are
Access Security Configurations
3DES-CBC:
Configuration Guide
67

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents