Ssh Algorithm - D-Link DES-6500 Manual

Modular layer 3 chassis-based ethernet switch
Hide thumbs Also See for DES-6500:
Table of Contents

Advertisement

SSH Algorithm

The SSH Algorithm window allows the configuration of the desired types of SSH algorithms used for authentication
encryption. There are three categories of algorithms listed and specific algorithms of each may be enabled or disabled by
using their corresponding pull-down menus. All algorithms are enabled by default. To open the following window, click
Security Management > Secure Shell (SSH) > SSH Authentication Mode and Algorithm Settings:
The following algorithms may be set:
Parameter
3DES-CBC
Blow-fish CBC
DES-6500 Chassis-based Layer 3 Ethernet Switch Manual
Figure 8- 6. SSH Algorithms window
Description
Encryption Algorithm
Use the pull-down to enable or disable the Triple Data Encryption Standard encryption
algorithm with Cipher Block Chaining. The default is Enabled.
Use the pull-down to enable or disable the Blowfish encryption algorithm with Cipher
Block Chaining. The default is Enabled.
196

Advertisement

Table of Contents
loading

Table of Contents