D-Link DFL-900 User Manual page 60

D-link dfl-900; dfl-1500 vpn/firewall router
Hide thumbs Also See for DFL-900:
Table of Contents

Advertisement

Part II
Basic Configuration
Remote Management
Access methods
Telnet
SSH
WWW
HTTPS
SNMP
MISC
The priority of the login methods to configure the DFL-1500 is described as the following Table 5-2..
Priority
Login Method
1
Console
SSH
2
Telnet
HTTPS
3
HTTP
D-Link
Telnet is a protocol for remote computing on the Internet. It allows a computer to act as a remote
terminal on another machine, anywhere on the Internet. This means that when you telnet to a
particular host and port, the remote computer (which must have a telnet server) accepts input directly
from your computer (which must have a telnet client) and output for your session is directed to your
screen. There are many library and information resources that are accessible through telnet.
Secure Shell (SSH), sometimes known as Secure Socket Shell, is a UNIX-based command interface
and protocol for securely getting access to a remote computer. It is widely used by network
administrators to control Web and other kinds of servers remotely. SSH is actually a suite of three
utilities - slogin, ssh, and scp - that are secure versions of the earlier UNIX utilities, rlogin, rsh, and
rcp. SSH commands are encrypted and secure in several ways. Both ends of the client/server
connection are authenticated using a digital certificate, and passwords are protected by being
encrypted. SSH uses RSA public key cryptography for both connection and authentication.
Encryption algorithms include Blowfish, DES, and IDEA. IDEA is the default.
World Wide Web. Two meanings - First, loosely used: the whole constellation of resources that can
be accessed using Gopher, FTP, HTTP, telnet, USENET, WAIS and some other tools. Second, the
universe of hypertext servers (HTTP servers) which are the servers that allow text, graphics, sound
files, etc. to be mixed together.
WWW allows HTTP connections to the web-based manager through the selected interface. HTTP
connections are not secure and can be intercepted by a third party.
HyperText Transfer Protocol Secure. A secure protocol for sending information back and forth over
the Internet. The HTTPS protocol most frequently relies on the SSL (Secure Socket Layer)
encryption system but others such as TLS (Transport layer security) are also available.
Simple Network Management Protocol; a standard for gathering statistical data about network traffic
and the behavior of network components; SNMP uses management information bases (MIBs),
which define what information is available from any manageable network device.
ICMP is an acronym for Internet Control Message Protocol. An ICMP is the standard error and
control message protocol for Internet systems. The most well known use of ICMP messages is the
Echo Request, Echo Reply sequence used by ping.
Table 5-1 Definition of the Remote Management Methods
If you login using console method, then anyone else won't configure DFL-1500 afterward. For the
CLI commands of console, please refer Appendix A.
You can login DFL-1500 using SSH or telnet method multiple times remotely. This is useful while
you are trying to debug the network problem using the CLI commands "tcpdump". The priority of
SSH is equal with telnet method. For the CLI commands of SSH/Telnet, please refer Appendix A.
The priority of HTTPS is equal with HTTP.
Table 5-2 Priorities of login method
Definition
Description
52

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dfl-1500

Table of Contents