Secure Shell (Ssh) - D-Link DES-3526 Manual

Managed layer 2 ethernet switch 24-port 10/100mbps and 2ge ports
Hide thumbs Also See for DES-3526:
Table of Contents

Advertisement

EDE CBC SHA
RSA EXPORT with
RC4 40 MD5
SSL Status
NOTE: Certain implementations concerning the function and
configuration of SSL are not available on the web-based management
of this Switch and need to be configured using the command line
interface. For more information on SSL and its functions, see the DES-
3526
documentation CD of this product.
NOTE: Enabling the SSL command will disable the web-based switch
management. To log on to the Switch again, the header of the URL
must begin with https://. Entering anything else into the address field
of the web browser will result in an error and no authentication will be
granted.

Secure Shell (SSH)

SSH is an abbreviation of Secure Shell, which is a program allowing secure remote login and secure
network services over an insecure network. It allows a secure login to remote host computers, a safe
method of executing commands on a remote end node, and will provide secure encrypted and
authenticated communication between two non-trusted hosts. SSH, with its array of unmatched
security features is an essential tool in today's networking environment. It is a powerful guardian
against numerous existing security hazards that now threaten network communications.
The steps required to use the SSH protocol for secure communication between a remote PC (the SSH
client) and the Switch (the SSH server) are as follows:
1. Create a user account with admin-level access using the User Accounts window in the
Security Management folder. This is identical to creating any other admin-level User
Account on the Switch, including specifying a password. This password is used to logon to the
Switch, once a secure communication path has been established using the SSH protocol.
2. Configure the User Account to use a specified authorization method to identify users that are
allowed to establish SSH connections with the Switch using the SSH User Authentication
window. There are three choices as to the method SSH will use to authorize the user, which are
Host Based, Password and Public Key.
3. Configure the encryption algorithm that SSH will use to encrypt and decrypt messages sent
between the SSH client and the SSH server, using the SSH Algorithm window.
4. Finally, enable SSH on the Switch using the SSH Configuration window.
After completing the preceding steps, a SSH Client on a remote PC can be configured to manage the
Switch using a secure, in band connection.
DES-3526 / DES-3526DC Fast Ethernet Layer 2 Switch
3DES_EDE encryption and SHA Hash Algorithm. Use the pull-down menu to enable
or disable this ciphersuite. This field is Enabled by default.
This ciphersuite combines the RSA Export key exchange and stream cipher RC4
encryption with 40-bit keys. Use the pull-down menu to enable or disable this
ciphersuite. This field is Enabled by default.
Use the pull-down menu to enable or disable the SSL status on the switch. The
default is Disabled.
Command
Line
Reference
Manual,
136
located
on
the

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Des-3526dc

Table of Contents