Ssh Authentication Method And Algorithm Settings - D-Link xStack DGS-3620 Series Reference Manual

Layer 3 managed stackable gigabit switch
Hide thumbs Also See for xStack DGS-3620 Series:
Table of Contents

Advertisement

®
xStack
DGS-3620 Series Layer 3 Managed Stackable Gigabit Switch Web UI Reference Guide
Rekey Timeout
TCP Port Number (1-
65535)
Bypass Login Screen
State
Key ID
Type
User Name
Click the Apply button to accept the changes made for each individual section.
On this page the user can also download the SSH public key file on client computer to the switch through TFTP
protocol. Click the Browse button to navigate to the key file, located on the client computer, and click the
Download button to initiate the download.
Click the Upload SSH Public Key button to upload the SSH public key file from the switch to a computer through
the TFTP protocol.

SSH Authentication Method and Algorithm Settings

Users can configure the desired types of SSH algorithms used for authentication encryption. There are three
categories of algorithms listed and specific algorithms of each may be enabled or disabled by ticking their
corresponding check boxes. All algorithms are enabled by default.
To view this window, click Security > SSH > SSH Authentication method and Algorithm Settings as shown
below:
Figure 9-83 SSH Authentication Method and Algorithm Settings window
Use the drop-down menu to set the time period that the Switch will change the
security shell encryptions by using the drop-down menu. The available options are
Never, 10 min, 30 min, and 60 min. The default setting is Never.
Enter the TCP Port Number used for SSH. The default value is 22.
Specifies to bypass the username and password login screen to avoid a secondary
authentication after using SSH public key authentication. If this method is specified,
the login user using SSH public key authentication can execute command directly
with the initial privilege level of the login user.
Enter the key ID that will be associated with the user account. This value must be
between 1 and 8.
Select the type of action that will be taken. Options to choose from are Add User and
Delete User. Selecting Add User specifies to add an association between the key and
the user account. When a public key is associated with a user account, the public key
can only be used by that user account. A public key may be associated with more
than one user account, and a user account may associate with more than one public
keys. A public key which has not been associated with any user account can be used
by all users. Selecting Remove User specifies to remove the association between the
key and the user account.
Enter the user account's user name here. This name can be up to 15 characters long.
495

Advertisement

Table of Contents
loading

Table of Contents