Ssh Authmode And Algorithm Settings - D-Link xStack DES-3528 series User Manual

Layer 2 managed stackable fast
Hide thumbs Also See for xStack DES-3528 series:
Table of Contents

Advertisement

®
xStack
DES-3528/DES-3552 Series Layer 2 Stackable Fast Ethernet Managed Switch User Manual
TCP Port Number
(1-65535)
Rekey Timeout
Click Apply to implement changes made.

SSH Authmode and Algorithm Settings

The SSH Algorithm window allows the configuration of the desired types of SSH algorithms used for authentication
encryption. There are four categories of algorithms listed and specific algorithms of each may be enabled or disabled
by checking the boxes. All algorithms are enabled by default.
To view this screen click, Security > SSH > SSH Authmode and Algorithm Settings
The following algorithms may be set:
Parameter
Password
Public Key
Host-based
3DES-CBC
Blow-fish CBC
AES128-CBC
AES192-CBC
Specifies the TCP port used to communication between SSH client and server. The default
value is 22.
Using the pull-down menu uses this field to set the time period that the Switch will change the
security shell encryptions. The available options are Never, 10 min, 30 min, and 60 min. The
default setting is Never.
Figure 6 - 30 SSH Authmode and Algorithm Settings window
Description
SSH Authentication Mode Settings
This parameter may be enabled if the administrator wishes to use a locally configured
password for authentication on the Switch. The default is enabled.
This parameter may be enabled if the administrator wishes to use a public key configuration
set on a SSH server, for authentication on the Switch. The default is enabled.
This parameter may be enabled if the administrator wishes to use a host computer for
authentication. This parameter is intended for Linux users requiring SSH authentication
techniques and the host computer is running the Linux operating system with a SSH
program previously installed. The default is enabled.
Check the box to enable the Triple Data Encryption Standard encryption algorithm with
Cipher Block Chaining. The default is enabled.
Check the box to enable the Blowfish encryption algorithm with Cipher Block Chaining. The
default is enabled.
Check the box to enable the Advanced Encryption Standard AES128 encryption algorithm
with Cipher Block Chaining. The default is enabled.
Check the box to enable the Advanced Encryption Standard AES192 encryption algorithm
with Cipher Block Chaining. The default is enabled.
Encryption Algorithm
198

Advertisement

Table of Contents
loading

This manual is also suitable for:

Xstack des-3552 series

Table of Contents