D-Link DXS-3400 User Manual - Page 379
SSH, SSH Global Settings, Security > SSH >SSH Global Settings, IP SSH Server State
View all D-Link DXS-3400 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 379 highlights
SSH DXS-3400 Series Lite Layer 3 Stackable 10GbE Managed Switch Web UI Reference Guide Secure Shell (SSH) is a program allowing secure remote login and secure network services over an insecure network. It allows a secure login to remote host computers, a safe method of executing commands on a remote end node, and will provide secure encrypted and authenticated communication between two non-trusted hosts. SSH, with its array of unmatched security features is an essential tool in today's networking environment. It is a powerful guardian against numerous existing security hazards that now threaten network communications. The steps required to use the SSH protocol for secure communication between a remote PC (the SSH client) and the Switch (the SSH server) are as follows: • Create a user account with admin-level access using the User Accounts window. This is identical to creating any other admin-level User Account on the Switch, including specifying a password. This password is used to logon to the Switch, once a secure communication path has been established using the SSH protocol. • Configure the User Account to use a specified authorization method to identify users that are allowed to establish SSH connections with the Switch using the SSH User Authentication Mode window. There are three choices as to the method SSH will use to authorize the user, which are Host Based, Password, and Public Key. • Configure the encryption algorithm that SSH will use to encrypt and decrypt messages sent between the SSH client and the SSH server, using the SSH Authentication Method and Algorithm Settings window. • Finally, enable SSH on the Switch using the SSH Configuration window. After completing the preceding steps, a SSH Client on a remote PC can be configured to manage the Switch using a secure, in band connection. SSH Global Settings This window is used to display and configure the SSH global settings. To view the following window, click Security > SSH >SSH Global Settings, as shown below: Figure 9-88SSH Global Settings Window The fields that can be configured are described below: Parameter IP SSH Server State IP SSH Service Port Authentication Timeout Authentication Retries Description Select to enable or disable the SSH server's global state. Enter the SSH service port number used here. This value must be between 1 and 65535. By default, this number is 22. Enter the authentication timeout value here. This value must be between 30 and 600 seconds. By default, this value is 120 seconds. Enter the authentication retries value here. This value must be between 1 and 32. By default, this value is 3. Click the Apply button to accept the changes made. 369