D-Link DES-3526DC Product Manual - Page 152

SSH Algorithm, Auth. Fail 2-20, Session Rekeying, Encryption Algorithm window, Parameter

Page 152 highlights

xStack DES-3500 Series Layer 2 Stackable Fast Ethernet Managed Switch User Manual Auth. Fail (2-20) Session Rekeying Allows the Administrator to set the maximum number of attempts that a user may try to log on to the SSH Server utilizing the SSH authentication. After the maximum number of attempts has been exceeded, the Switch will be disconnected and the user must reconnect to the Switch to attempt another login. The number of maximum attempts may be set between 2 and 20. The default setting is 2. Using the pull-down menu uses this field to set the time period that the Switch will change the security shell encryptions. The available options are Never, 10 min, 30 min, and 60 min. The default setting is Never. SSH Algorithm The SSH Algorithm window allows the configuration of the desired types of SSH algorithms used for authentication encryption. There are four categories of algorithms listed and specific algorithms of each may be enabled or disabled by using their corresponding pull-down menus. All algorithms are enabled by default. To open the following window, click Security Management > Secure Shell (SSH) > SSH Algorithm: Figure 7- 25. Encryption Algorithm window The following algorithms may be set: Parameter Description 3DES-CBC Blow-fish CBC AES128-CBC Encryption Algorithm Use the pull-down to enable or disable the Triple Data Encryption Standard encryption algorithm with Cipher Block Chaining. The default is Enabled. Use the pull-down to enable or disable the Blowfish encryption algorithm with Cipher Block Chaining. The default is Enabled. Use the pull-down to enable or disable the Advanced Encryption Standard AES128 encryption algorithm with Cipher Block Chaining. The default is Enabled. 138

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260

xStack DES-3500 Series Layer 2 Stackable Fast Ethernet Managed Switch User Manual
138
Auth. Fail (2-20)
Allows the Administrator to set the maximum number of attempts that a user may try to log on
to the SSH Server utilizing the SSH authentication. After the maximum number of attempts has
been exceeded, the Switch will be disconnected and the user must reconnect to the Switch to
attempt another login. The number of maximum attempts may be set between
2
and
20
. The
default setting is
2
.
Session Rekeying
Using the pull-down menu uses this field to set the time period that the Switch will change the
security shell encryptions. The available options are
Never
,
10 min
,
30 min
, and
60 min
. The
default setting is
Never
.
SSH Algorithm
The SSH Algorithm window allows the configuration of the desired types of SSH algorithms used for authentication encryption.
There are four categories of algorithms listed and specific algorithms of each may be enabled or disabled by using their
corresponding pull-down menus. All algorithms are enabled by default. To open the following window, click
Security
Management > Secure Shell (SSH) > SSH Algorithm:
Figure 7- 25. Encryption Algorithm window
The following algorithms may be set:
Parameter
Description
Encryption Algorithm
3DES-CBC
Use the pull-down to enable or disable the Triple Data Encryption Standard encryption
algorithm with Cipher Block Chaining. The default is
Enabled
.
Blow-fish CBC
Use the pull-down to enable or disable the Blowfish encryption algorithm with Cipher Block
Chaining. The default is
Enabled
.
AES128-CBC
Use the pull-down to enable or disable the Advanced Encryption Standard AES128
encryption algorithm with Cipher Block Chaining. The default is
Enabled
.