D-Link DGS-3120-24TC Product Manual - Page 255

Security > SSH > SSH Authentication method and Algorithm Settings, SSH Authentication Mode

Page 255 highlights

xStack® DGS-3120 Series Managed Switch Web UI Reference Guide To view this window, click Security > SSH > SSH Authentication method and Algorithm Settings as shown below: Figure 8-60 SSH Authentication Method and Algorithm Settings window The fields that can be configured for SSH Authentication Mode are described below: Parameter Description Password This may be enabled or disabled to choose if the administrator wishes to use a locally configured password for authentication on the Switch. This parameter is enabled by default. Public Key This may be enabled or disabled to choose if the administrator wishes to use a public key configuration set on a SSH server, for authentication. This parameter is enabled by default. Host-based This may be enabled or disabled to choose if the administrator wishes to use a host computer for authentication. This parameter is intended for Linux users requiring SSH authentication techniques and the host computer is running the Linux operating system with a SSH program previously installed. This parameter is enabled by default. Click the Apply button to accept the changes made. The fields that can be configured for the Encryption Algorithm are described below: Parameter Description 3DES-CBC Blow-fish CBC AES128-CBC AES192-CBC AES256-CBC ARC4 Cast128-CBC Use the check box to enable or disable the Triple Data Encryption Standard encryption algorithm with Cipher Block Chaining. The default is enabled. Use the check box to enable or disable the Blowfish encryption algorithm with Cipher Block Chaining. The default is enabled. Use the check box to enable or disable the Advanced Encryption Standard AES128 encryption algorithm with Cipher Block Chaining. The default is enabled. Use the check box to enable or disable the Advanced Encryption Standard AES192 encryption algorithm with Cipher Block Chaining. The default is enabled. Use the check box to enable or disable the Advanced Encryption Standard AES-256 encryption algorithm with Cipher Block Chaining. The default is enabled. Use the check box to enable or disable the Arcfour encryption algorithm with Cipher Block Chaining. The default is enabled. Use the check box to enable or disable the Cast128 encryption algorithm with Cipher Block Chaining. The default is enabled. 247

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339

xStack® DGS-3120 Series Managed Switch Web UI Reference Guide
247
To view this window, click
Security > SSH > SSH Authentication method and Algorithm Settings
as shown
below:
Figure 8–60 SSH Authentication Method and Algorithm Settings window
The fields that can be configured for
SSH Authentication Mode
are described below:
Parameter
Description
Password
This may be enabled or disabled to choose if the administrator wishes to use a
locally configured password for authentication on the Switch. This parameter is
enabled
by default.
Public Key
This may be enabled or disabled to choose if the administrator wishes to use a
public key configuration set on a SSH server, for authentication. This parameter is
enabled
by default.
Host-based
This may be enabled or disabled to choose if the administrator wishes to use a host
computer for authentication. This parameter is intended for Linux users requiring
SSH authentication techniques and the host computer is running the Linux operating
system with a SSH program previously installed. This parameter is enabled
by
default.
Click the
Apply
button to accept the changes made.
The fields that can be configured for the
Encryption Algorithm
are described below:
Parameter
Description
3DES-CBC
Use the check box to enable or disable the Triple Data Encryption Standard
encryption algorithm with Cipher Block Chaining. The default is enabled.
Blow-fish CBC
Use the check box to enable or disable the Blowfish encryption algorithm with
Cipher Block Chaining. The default is enabled.
AES128-CBC
Use the check box to enable or disable the Advanced Encryption Standard AES128
encryption algorithm with Cipher Block Chaining. The default is enabled.
AES192-CBC
Use the check box to enable or disable the Advanced Encryption Standard AES192
encryption algorithm with Cipher Block Chaining. The default is enabled.
AES256-CBC
Use the check box to enable or disable the Advanced Encryption Standard AES-256
encryption algorithm with Cipher Block Chaining. The default is enabled.
ARC4
Use the check box to enable or disable the Arcfour encryption algorithm with Cipher
Block Chaining. The default is enabled.
Cast128-CBC
Use the check box to enable or disable the Cast128 encryption algorithm with
Cipher Block Chaining. The default is enabled.