Ssh Authmode And Algorithm Settings - D-Link DGS-3200 Series User Manual

Layer 2 gigabit ethernet managed switch
Hide thumbs Also See for DGS-3200 Series:
Table of Contents

Advertisement

Parameter
SSH Server Status
Max Session (1-8)
Connection Timeout
(120-600 sec)
Max. Auth. Fail Time
(2-20)
Session Rekeying

SSH Authmode and Algorithm Settings

This window allows the configuration of the desired types of SSH algorithms used for authentication encryption. There are three
categories of algorithms listed and specific algorithms of each may be enabled or disabled by ticking their corresponding check
boxes. All algorithms are enabled by default.
To open the following window, click Security > SSH > SSH Authmode and Algorithm Settings:
The following algorithms may be set:
Parameter
Password
Public Key
Host Based
DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch
Description
Use the radio buttons to enable or disable SSH on the Switch. The default is Disabled.
Enter a value between 1 and 8 to set the number of users that may simultaneously access
the Switch. The default setting is 8.
Allows the user to set the connection timeout. The user may set a time between 120 and 600
seconds. The default setting is 120 seconds.
Allows the Administrator to set the maximum number of attempts that a user may try to log
on to the SSH Server utilizing the SSH authentication. After the maximum number of
attempts has been exceeded, the Switch will be disconnected and the user must reconnect
to the Switch to attempt another login. The number of maximum attempts may be set
between 2 and 20. The default setting is 2.
This field is used to set the time period that the Switch will change the security shell
encryptions by using the pull-down menu. The available options are Never, 10 min, 30 min,
and 60 min. The default setting is Never.
Figure 9- 20. SSH Authmode and Algorithm Settings window
Description
SSH Authentication Mode Settings
This may be enabled or disabled to choose if the administrator wishes to use a locally
configured password for authentication on the Switch. This parameter is enabled by
default.
This may be enabled or disabled to choose if the administrator wishes to use a public key
configuration set on a SSH server, for authentication. This parameter is enabled by
default.
This may be enabled or disabled to choose if the administrator wishes to use a host
computer for authentication. This parameter is intended for Linux users requiring SSH
authentication techniques and the host computer is running the Linux operating system
with a SSH program previously installed. This parameter is enabled by default.
Encryption Algorithm
130

Advertisement

Table of Contents
loading

Table of Contents