Ssh Authentication Mode And Algorithm Settings - D-Link xStack DES-3800 Series User Manual

Layer 3 stackable fast ethernet managed switch
Hide thumbs Also See for xStack DES-3800 Series:
Table of Contents

Advertisement

Auth. Fail (2-20)
Session Rekeying

SSH Authentication Mode and Algorithm Settings

The SSH Algorithm window allows the
configuration of the desired types of SSH
algorithms used for authentication encryption.
There are four categories of algorithms listed and
specific algorithms of each may be enabled or
disabled by using their corresponding pull-down
menus. All algorithms are enabled by default. To
open the following window, click Security >
SSH > SSH Authentication Mode and
Algorithm Settings:
The following algorithms may be set:
Parameter
Password
Public Key
Host-based
xStack DES-3800 Series Layer 3 Stackable Fast Ethernet Managed Switch
Allows the Administrator to set the maximum number of attempts that a user may try to log on
to the SSH Server utilizing the SSH authentication. After the maximum number of attempts
has been exceeded, the Switch will be disconnected and the user must reconnect to the
Switch to attempt another login. The number of maximum attempts may be set between 2 and
20. The default setting is 2.
Using the pull-down menu uses this field to set the time period that the Switch will change the
security shell encryptions. The available options are Never, 10 min, 30 min, and 60 min. The
default setting is Never.
Description
SSH Authentication Mode and Algorithm Settings
This parameter may be enabled if the administrator wishes to use a locally configured
password for authentication on the Switch. The default is Enabled.
This parameter may be enabled if the administrator wishes to use a public key configuration
set on a SSH server, for authentication on the Switch. The default is Enabled.
This parameter may be enabled if the administrator wishes to use a host computer for
authentication. This parameter is intended for Linux users requiring SSH authentication
techniques and the host computer is running the Linux operating system with a SSH
program previously installed. The default is Enabled.
Figure 11- 44. Encryption Algorithm window
269

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents