Security > Ssh > Ssh User Authentication Lists - D-Link DGS-1500-20 Reference Manual

Smartpro switch web ui reference guide
Hide thumbs Also See for DGS-1500-20:
Table of Contents

Advertisement

5 Configuration
D-Link Web Smart Switch User Manual
Figure 5.90 – Security > SSH > SSH Authmode and Algorithm Settings
SSH Authentication Mode Settings:
Password: Allows user to use a locally configured password for authentication on the Switch. When SSH
status is enabled, the Password is enabled by default.
Public Key: This parameter may be enabled if the administrator wishes to use a public key configuration set
on a SSH server, for authentication on the Switch. The default is disabled.
Host Based: This parameter may be enabled if the administrator wishes to use a host computer for
authentication. This parameter is intended for Linux users requiring SSH authentication techniques and the
host computer is running the Linux operating system with a SSH program previously installed. The default is
disabled.
Encryption Algorithm:
DES-CBC: Use the check box to enable or disable the Data Encryption Standard encryption algorithm with
Cipher Block Chaining. The default is enabled.
3DES-CBC: Use the check box to enable or disable the Triple Data Encryption Standard encryption
algorithm with Cipher Block Chaining. The default is enabled.
Data Integrity Algorithm: When SSH status is enabled, the HMAC-MD5 and HMAC SHA1 are enabled by
default.
HMAC-MD5: Use the check box to enable the supports of hash for message Authentication Code (HMAC)
MD5 Message Digest (MD5) mechanism.
HMAC-SHA1: Use the check box to enable the supports of hash for message Authentication Code (HMAC)
Secure Hash Algorithm (SHA) mechanism.
Public Key Algorithm:
HMAC-RSA: Use the check box to enable the supports of Hash for Message Authentication Code (HMAC)
mechanism utilizing the RSA encryption algorithm. The default is disabled.
Click Apply to implement changes made.
Security > SSH > SSH User Authentication Lists
The SSH User Authentication Lists page is used to configure parameters for users attempting to access the
Switch through SSH.
Figure 5.91 – Security > SSH > SSH User Authentication Lists
The user may view the following parameters:
68

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dgs-1500-28Dgs-1500-52Dgs-1500-28p

Table of Contents