D-Link xStack Reference Manual page 460

Xstack ds-3620 series web ui reference guide layer 3 managed stackable gigabit switch
Hide thumbs Also See for xStack:
Table of Contents

Advertisement

®
xStack
DGS-3620 Series Layer 3 Managed Stackable Gigabit Switch Web UI Reference Guide
The fields that can be configured are described below:
Parameter
SSH Server State
Max. Session (1-8)
Connection Timeout
(30-600)
Authfail Attempts (2-
20)
Rekey Timeout
TCP Port Number (1-
65535)
Bypass Login Screen
State
Click the Apply button to accept the changes made for each individual section.
On this page the user can also download the SSH public key file on client computer to the switch through TFTP
protocol. Click the Browse button to navigate to the key file, located on the client computer, and click the
Download button to initiate the download.
Click the Upload SSH Public Key button to upload the SSH public key file from the switch to a computer through
the TFTP protocol.
Figure 9-80 SSH Settings window
Description
Use the radio buttons to enable or disable SSH on the Switch. The default is
Disabled.
Enter a value between 1 and 8 to set the number of users that may simultaneously
access the Switch. The default setting is 8.
Allows the user to set the connection timeout. The user may set a time between 30
and 600 seconds. The default setting is 120 seconds.
Allows the Administrator to set the maximum number of attempts that a user may try
to log on to the SSH Server utilizing the SSH authentication. After the maximum
number of attempts has been exceeded, the Switch will be disconnected and the user
must reconnect to the Switch to attempt another login. The number of maximum
attempts may be set between 2 and 20. The default setting is 2.
Use the drop-down menu to set the time period that the Switch will change the
security shell encryptions by using the drop-down menu. The available options are
Never, 10 min, 30 min, and 60 min. The default setting is Never.
Enter the TCP Port Number used for SSH. The default value is 22.
Specifies to bypass the username and password login screen to avoid a secondary
authentication after using SSH public key authentication. If this method is specified,
the login user using SSH public key authentication can execute command directly
with the initial privilege level of the login user.
459

Advertisement

Table of Contents
loading

This manual is also suitable for:

Xstack dgs-3620-28sc

Table of Contents