Ssh Authentication Method And Algorithm Settings - D-Link DGS-3700-12 User Manual

Dgs-3700 series layer 2 managed gigabit ethernet switch release 2.00
Hide thumbs Also See for DGS-3700-12:
Table of Contents

Advertisement

Timeout (120-600)
Authfail Attempts
(2-20)
Rekey Timeout
TCP Port Number
(1-65535)
Click Apply to implement changes made.

SSH Authentication Method and Algorithm Settings

The SSH Algorithm window allows the configuration of the desired types of SSH algorithms used for authentication
encryption. There are four categories of algorithms listed and specific algorithms of each may be enabled or disabled
by checking the boxes. All algorithms are enabled by default.
To view this window, click Security > SSH > SSH Authentication Method and Algorithm Settings, as shown below:
Figure 8- 56 SSH Authentication Method and Algorithm Settings window
The following algorithms may be set:
Parameter
Password
Public Key
Host-based
3DES-CBC
Blow-fish CBC
DGS-3700-12/DGS-3700-12G Series Layer 2 Gigabit Ethernet User Manual
seconds. The default setting is 120 seconds.
Allows the Administrator to set the maximum number of attempts that a user may try to log on
to the SSH Server utilizing the SSH authentication. After the maximum number of attempts
has been exceeded, the Switch will be disconnected and the user must reconnect to the
Switch to attempt another login. The number of maximum attempts may be set between 2 and
20. The default setting is 2.
Using the pull-down menu uses this field to set the time period that the Switch will change the
security shell encryptions. The available options are Never, 10 min, 30 min, and 60 min. The
default setting is Never.
Enter a value between 1 and 65535 for user to set the TCP port number to listen connection
request from ssh client. The default setting is 22.
Description
SSH Authentication Mode Settings
This parameter may be enabled if the administrator wishes to use a locally configured
password for authentication on the Switch. The default is enabled.
This parameter may be enabled if the administrator wishes to use a public key configuration
set on a SSH server, for authentication on the Switch. The default is enabled.
This parameter may be enabled if the administrator wishes to use a host computer for
authentication. This parameter is intended for Linux users requiring SSH authentication
techniques and the host computer is running the Linux operating system with a SSH
program previously installed. The default is enabled.
Tick the check box to enable the Triple Data Encryption Standard encryption algorithm with
Cipher Block Chaining. The default is enabled.
Tick the check box to enable the Blowfish encryption algorithm with Cipher Block Chaining.
The default is enabled.
Encryption Algorithm
244

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dgs-3700-12g

Table of Contents