Security > Ssh > Ssh User Authentication Lists - D-Link DGS-1210-28 Reference Manual

Web smart switch
Hide thumbs Also See for DGS-1210-28:
Table of Contents

Advertisement

4 Configuration
SSH Authentication Mode Settings:
Password: Allows user to use a locally configured password for authentication on the Switch.
Public Key: This parameter may be enabled if the administrator wishes to use a public key configuration set
on a SSH server, for authentication on the Switch.
Host Based: This parameter may be enabled if the administrator wishes to use a host computer for
authentication. This parameter is intended for Linux users requiring SSH authentication techniques and the
host computer is running the Linux operating system with a SSH program previously installed.
Encryption Algorithm:
3DES-CBC: Use the check box to enable or disable the Triple Data Encryption Standard encryption
algorithm with Cipher Block Chaining. The default is enabled.
Data Integrity Algorithm:
HMAC-MD5: Use the check box to enable the supports of hash for message Authentication Code (HMAC)
MD5 Message Digest (MD5) mechanism.
HMAC-SHA1: Use the check box to enable the supports of hash for message Authentication Code (HMAC)
Secure Hash Algorithm (SHA) mechanism.
Public Key Algorithm:
HMAC-RSA: Use the check box to enable the supports of Hash for Message Authentication Code (HMAC)
mechanism utilizing the RSA encryption algorithm.
Click Apply to implement changes made.
Security > SSH > SSH User Authentication Lists
The SSH User Authentication Lists page is used to configure parameters for users attempting to access the
Switch through SSH.
The user may view the following parameters:
User Name: A name of no more than 15 characters to identify the SSH user. This User Name must be a
previously configured user account on the Switch.
Auth. Mode: The administrator may choose one of the following to set the authorization for users attempting
to access the Switch.
Host Based – This parameter should be chosen if the administrator wishes to use a remote SSH
server for authentication purposes.
Figure 4.86 – Security > SSH > SSH Settings
Figure 4.87 – Security > SSH > SSH User Authentication Lists
5
5
D-Link Web Smart Switch User Manual
9
9

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents