Ssh Config - TP-Link T3700G-28TQ User Manual

Jetstream 28-port gigabit stackable l3 managed switch
Hide thumbs Also See for T3700G-28TQ:
Table of Contents

Advertisement

4.4.3 SSH Config

As stipulated by IFTF (Internet Engineering Task Force), SSH (Secure Shell) is a security protocol
established on application and transport layers. SSH-encrypted-connection is similar to a telnet
connection, but essentially the old telnet remote management method is not safe, because the
password and data transmitted with plain-text can be easily intercepted. SSH can provide
information security and powerful authentication when you log on to the switch remotely through
an insecure network environment. It can encrypt all the transmission data and prevent the
information in a remote management being leaked.
Comprising server and client, SSH has two versions, V1 and V2 which are not compatible with
each other. In the communication, SSH server and client can auto-negotiate the SSH version and
the encryption algorithm. After getting a successful negotiation, the client sends authentication
request to the server for login, and then the two can communicate with each other after successful
authentication. This switch supports SSH server and you can log on to the switch via SSH
connection using SSH client software.
SSH key can be downloaded into the switch. If the key is successfully downloaded, the certificate
authentication will be preferred for SSH access to the switch.
Choose the menu System→Access Security→SSH Config to load the following page.
The following entries are displayed on this screen:
Global Config
SSH:
Protocol V1:
Protocol V2:
Idle Timeout:
Figure 4-17 SSH Config
Select Enable/Disable SSH function.
Select Enable/Disable SSH V1 to be the supported protocol.
Select Enable/Disable SSH V2 to be the supported protocol.
Specify the idle timeout time. The system will automatically
release the connection when the time is up. The default time is
120 seconds.
28

Advertisement

Table of Contents
loading

Table of Contents