D-Link DGS-3120-24TC Product Manual - Page 256

SSH User Authentication List, Security > SSH > SSH User Authentication List

Page 256 highlights

xStack® DGS-3120 Series Managed Switch Web UI Reference Guide Twofish128 Use the check box to enable or disable the twofish128 encryption algorithm. The default is enabled. Twofish192 Use the check box to enable or disable the twofish192 encryption algorithm. The default is enabled. Twofish256 Use the check box to enable or disable the twofish256 encryption algorithm. The default is enabled. Click the Apply button to accept the changes made. The fields that can be configured for the Data Integrity Algorithm are described below: Parameter Description HMAC-SHA1 Use the check box to enable or disable the HMAC (Hash for Message Authentication Code) mechanism utilizing the Secure Hash algorithm. The default is enabled. HMAC-MD5 Use the check box to enable or disable the HMAC (Hash for Message Authentication Code) mechanism utilizing the MD5 Message Digest encryption algorithm. The default is enabled. Click the Apply button to accept the changes made. The fields that can be configured for the Public Key Algorithm are described below: Parameter Description HMAC-RSA Use the check box to enable or disable the HMAC (Hash for Message Authentication Code) mechanism utilizing the RSA encryption algorithm. The default is enabled. HMAC-DSA Use the check box to enable or disable the HMAC (Hash for Message Authentication Code) mechanism utilizing the Digital Signature Algorithm (DSA) encryption. The default is enabled. Click the Apply button to accept the changes made. SSH User Authentication List Users can configure parameters for users attempting to access the Switch through SSH. In the window above, the User Account "username" has been previously set using the User Accounts window in the Configuration folder. A User Account MUST be set in order to set the parameters for the SSH user. To view this window, click Security > SSH > SSH User Authentication List as shown below: Figure 8-61 SSH User Authentication List window The fields that can be configured are described below: Parameter Description User Name Authentication Method A name of no more than 15 characters to identify the SSH user. This User Name must be a previously configured user account on the Switch. The administrator may choose one of the following to set the authorization for users 248

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339

xStack® DGS-3120 Series Managed Switch Web UI Reference Guide
248
Twofish128
Use the check box to enable or disable the twofish128 encryption algorithm. The
default is enabled.
Twofish192
Use the check box to enable or disable the twofish192 encryption algorithm. The
default is enabled.
Twofish256
Use the check box to enable or disable the twofish256 encryption algorithm. The
default is enabled.
Click the
Apply
button to accept the changes made.
The fields that can be configured for the
Data Integrity Algorithm
are described below:
Parameter
Description
HMAC-SHA1
Use the check box to enable or disable the HMAC (Hash for Message
Authentication Code) mechanism utilizing the Secure Hash algorithm. The default is
enabled.
HMAC-MD5
Use the check box to enable or disable the HMAC (Hash for Message
Authentication Code) mechanism utilizing the MD5 Message Digest encryption
algorithm. The default is enabled.
Click the
Apply
button to accept the changes made.
The fields that can be configured for the
Public Key Algorithm
are described below:
Parameter
Description
HMAC-RSA
Use the check box to enable or disable the HMAC (Hash for Message
Authentication Code) mechanism utilizing the RSA encryption algorithm. The default
is enabled.
HMAC-DSA
Use the check box to enable or disable the HMAC (Hash for Message
Authentication Code) mechanism utilizing the Digital Signature Algorithm (DSA)
encryption. The default is enabled.
Click the
Apply
button to accept the changes made.
SSH User Authentication List
Users can configure parameters for users attempting to access the Switch through SSH. In the window above, the
User Account “username” has been previously set using the
User Accounts
window in the
Configuration
folder. A
User Account MUST be set in order to set the parameters for the SSH user.
To view this window, click
Security > SSH > SSH User Authentication List
as shown below:
Figure 8–61 SSH User Authentication List window
The fields that can be configured are described below:
Parameter
Description
User Name
A name of no more than 15 characters to identify the SSH user. This User Name
must be a previously configured user account on the Switch.
Authentication Method
The administrator may choose one of the following to set the authorization for users