Ssh User Authentication Lists - D-Link DES-3528 User Manual

Xstack
Hide thumbs Also See for DES-3528:
Table of Contents

Advertisement

xStack DES-3528 Series Layer 2 Stackable Fast Ethernet Managed Switch User Manual
Cast128-CBC
Twofish128
Twofish192
Twofish256
HMAC-SHA1
HMAC-MD5
HMAC-RSA
HMAC-DSA
Click Apply to implement changes made.

SSH User Authentication Lists

The following windows are used to configure parameters for users attempting to access the Switch through SSH.
To access the following window, click Security > SSH > SSH User Authentication Mode.
In the example aboveright, the User Account "RG" has been previously set using the User Accounts window in the
Configuratrion folder. A User Account MUST be set in order to set the parameters for the SSH user. To Edit the
parameters for a SSH user, click on the corresponding Edit button, which will reveal the following window to configure.
The user may set the following parameters:
Parameter
User Name
Auth. Mode
Use the pull-down to enable or disable the Cast128 encryption algorithm with Cipher Block
Chaining. The default is enabled.
Use the pull-down to enable or disable the twofish128 encryption algorithm. The default is
enabled.
Use the pull-down to enable or disable the twofish192 encryption algorithm. The default is
enabled.
Use the pull-down to enable or disable the twofish256 encryption algorithm. The default is
enabled.
Data Integrity Algorithm
Use the pull-down to enable or disable the HMAC (Hash for Message Authentication Code)
mechanism utilizing the Secure Hash algorithm. The default is enabled.
Use the pull-down to enable or disable the HMAC (Hash for Message Authentication Code)
mechanism utilizing the MD5 Message Digest encryption algorithm. The default is enabled.
Public Key Algorithm
Use the pull-down to enable or disable the HMAC (Hash for Message Authentication Code)
mechanism utilizing the RSA encryption algorithm. The default is enabled.
Use the pull-down to enable or disable the HMAC (Hash for Message Authentication Code)
mechanism utilizing the Digital Signature Algorithm encryption. The default is enabled.
Figure 9- 32. SSH User Authentication Lists window
Figure 9- 33. SSH User Authentication Lists - Edit window
Description
Enter a User Name of no more than 15 characters to identify the SSH user. This User Name
must be a previously configured user account on the Switch.
The administrator may choose one of the following to set the authorization for users
attempting to access the Switch.
Host Based – This parameter should be chosen if the administrator wishes to use a remote
151

Advertisement

Table of Contents
loading

Table of Contents