D-Link 3100 48 User Manual - Page 122

Configuring Secure Shell Security - default password

Page 122 highlights

DGS-3100 Series Gigabit Stackable Managed Switch User Manual Configuring Secure Shell Security Secure Shell permits network users to securely login to the network from a remote location over an insecure network. SSH a secure login to remote host computers, a safe method of executing commands on a remote end node, and will provide secure encrypted and authenticated communication between two non-trusted hosts. SSH, with its array of unmatched security features is an essential tool in today's networking environment. It is a powerful guardian against numerous existing security hazards that now threaten network communications. Ensure the following steps are completed before configuring SSH: • Create a user account with admin-level access using the User Accounts window in the Administration folder. This is identical to creating any other admin-level User Account on the Switch, including specifying a password. This password is used to logon to the Switch, once a secure communication path has been established using the SSH protocol. • Configure the User Account to use a specified authorization method to identify users that are allowed to establish SSH connections with the Switch using the Current Accounts window (Security > Secure Shell (SSH) > SSH User Authentication). There is a special SSH method that mey be used to authorize the user: Public Key. The default value is None. To define SSH on the device: 1. Click Security > SSH > SSH Configuration. The SSH Configuration Page opens: Figure 5 -15. SSH Configuration Page The SSH Configuration Page contains the following fields: Field SSH Server Status Description Indicates if SSH is enabled on the device. The possible field values are: Enable - Enables SSH on the device. Disable - Disables SSH on the device. This is the default value. Port (1-65535) Displays the port number used to authenticate the SSH session. The possible field range is 165535. The field default is 22. 2. Enable or disable the SSH server status in the SSH Server Status field. 110

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209

DGS-3100 Series Gigabit Stackable Managed Switch User Manual
110
Configuring Secure Shell Security
Secure Shell
permits network users to securely login to the network from a remote location over an insecure network. SSH a
secure login to remote host computers, a safe method of executing commands on a remote end node, and will provide secure
encrypted and authenticated communication between two non-trusted hosts. SSH, with its array of unmatched security
features is an essential tool in today’s networking environment. It is a powerful guardian against numerous existing security
hazards that now threaten network communications.
Ensure the following steps are completed before configuring SSH:
Create a user account with admin-level access using the
User Accounts
window in the
Administration folder
. This is
identical to creating any other admin-level User Account on the Switch, including specifying a password. This
password is used to logon to the Switch, once a secure communication path has been established using the SSH
protocol.
Configure the User Account to use a specified authorization method to identify users that are allowed to establish SSH
connections with the Switch using the
Current Accounts
window (
Security
>
Secure Shell (SSH)
>
SSH User
Authentication
). There is a special SSH method that mey be used to authorize the user:
Public Key
. The default value
is
None
.
To define SSH on the device:
1.
Click
Security > SSH > SSH Configuration
. The
SSH Configuration Page
opens:
Figure 5 -15. SSH Configuration Page
The
SSH Configuration Page
contains the following fields:
Field
Description
SSH Server Status
Indicates if SSH is enabled on the device. The possible field values are:
Enable
— Enables SSH on the device.
Disable
— Disables SSH on the device. This is the default value.
Port (1-65535)
Displays the port number used to authenticate the SSH session. The possible field range is 1-
65535. The field default is 22.
2.
Enable or disable the SSH server status in the
SSH Server Status
field.