D-Link NetDefend DFL-210 Cli Reference Manual page 126

Network security firewall
Hide thumbs Also See for NetDefend DFL-210:
Table of Contents

Advertisement

3.34.3. RemoteMgmtSSH
Secure Shell (SSH) Server.
Properties
Name
Port
AllowAuthMethodPassword
AllowAuthMethodPublicKey
AllowHostKeyDSA
AllowHostKeyRSA
AllowKexDH14
AllowKexDH1
AllowAES128
AllowAES192
AllowAES256
AllowBlowfish
Allow3DES
AllowMACSHA1
AllowMACMD5
AllowMACSHA196
AllowMACMD596
Banner
MaxSessions
SessionIdleTime
LoginGraceTime
AuthenticationRetries
AccessLevel
LocalUserDatabase
Interface
Specifies a symbolic name for the SSH server. (Identifier)
The listening port for the SSH server. (Default: 22)
Allow password client authentication. (Default: Yes)
Allow public key client authentication. (Default: Yes)
Allow DSA public key algorithm. (Default: Yes)
Allow RSA public key algorithm. (Default: Yes)
Allow Diffie-Hellman Group 1 key exchange algorithm.
(Default: Yes)
Allow Diffie-Hellman Group 14 key exchange algorithm.
(Default: Yes)
Allow AES-128 encryption algorithm. (Default: Yes)
Allow AES-192 encryption algorithm. (Default: Yes)
Allow AES-256 encryption algorithm. (Default: Yes)
Allow Blowfish encryption algorithm. (Default: Yes)
Allow 3DES encryption algorithm. (Default: Yes)
Allow SHA1 integrity algorithm. (Default: Yes)
Allow MD5 integrity algorithm. (Default: Yes)
Allow SHA1-96 integrity algorithm. (Default: Yes)
Allow MD5-96 integrity algorithm. (Default: Yes)
Specifies the greeting message to display when the user logs
in. (Optional)
The maximum number of clients that can be connected at the
same time. (Default: 5)
The number of seconds a user can be idle before the session is
closed. (Default: 1800)
When the user has supplied the username, the password has to
be provided within this number of seconds or the session will
be closed. (Default: 30)
The number of retires allowed before the session is closed.
(Default: 5)
The access level to grant the user that logs in. (Default: Ad-
min)
Specifies the local user database to use for login.
Specifies the interface for which remote access is granted.
116
Chapter 3. Configuration Reference

Advertisement

Table of Contents
loading

Table of Contents