D-Link DGS-1510-20 User Manual - Page 357

SSL, IPv4 Address

Page 357 highlights

DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide Figure 9-90 SSH User Settings window The fields that can be configured are described below: Parameter User Name Authentication Method Key File Host Name IPv4 Address IPv6 Address Description Enter the SSH user's username used here. This name can be up to 32 characters long. Select the authentication methods used here. Options to choose from are Password, Public Key, and Host-based. After selecting the Public Key or Host-based option as the Authentication Method, enter the public key here. After selecting the Host-based option as the Authentication Method, enter the host name here. After selecting the Host-based option as the Authentication Method, select and enter the IPv4 address here. After selecting the Host-based option as the Authentication Method, select and enter the IPv6 address here. Click the Apply button to accept the changes made. Enter a page number and click the Go button to navigate to a specific page when multiple pages exist. SSL Secure Sockets Layer (SSL) is a security feature that will provide a secure communication path between a host and client through the use of authentication, digital signatures and encryption. These security functions are implemented through the use of a cipher suite, which is a security string that determines the exact cryptographic parameters, specific encryption algorithms and key sizes to be used for an authentication session and consists of three levels: • Key Exchange: The first part of the Cipher suite string specifies the public key algorithm to be used. This switch utilizes the Rivest Shamir Adleman (RSA) public key algorithm and the Digital Signature Algorithm (DSA), specified here as the DHE DSS Diffie-Hellman (DHE) public key algorithm. This is the first authentication process between client and host as they "exchange keys" in looking for a match and therefore authentication to be accepted to negotiate encryptions on the following level. • Encryption: The second part of the cipher suite that includes the encryption used for encrypting the messages sent between client and host. The Switch supports two types of cryptology algorithms: o Stream Ciphers - There are two types of stream ciphers on the Switch, RC4 with 40-bit keys and RC4 with 128-bit keys. These keys are used to encrypt messages and need to be consistent between client and host for optimal use. o CBC Block Ciphers - CBC refers to Cipher Block Chaining, which means that a portion of the previously encrypted block of encrypted text is used in the encryption of the current 349

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430

DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide
349
Figure 9-90 SSH User Settings window
The fields that can be configured are described below:
Parameter
Description
User Name
Enter the SSH user’s username used here. This name can be up to 32
characters long.
Authentication Method
Select the authentication methods used here. Options to choose from
are
Password
,
Public Key
, and
Host-based
.
Key File
After selecting the
Public Key
or
Host-based
option as the
Authentication Method
, enter the public key here.
Host Name
After selecting the
Host-based
option as the
Authentication Method
,
enter the host name here.
IPv4 Address
After selecting the
Host-based
option as the
Authentication Method
,
select and enter the IPv4 address here.
IPv6 Address
After selecting the
Host-based
option as the
Authentication Method
,
select and enter the IPv6 address here.
Click the
Apply
button to accept the changes made.
Enter a page number and click the
Go
button to navigate to a specific page when multiple pages exist.
SSL
Secure Sockets Layer (SSL) is a security feature that will provide a secure communication path between
a host and client through the use of authentication, digital signatures and encryption. These security
functions are implemented through the use of a cipher suite, which is a security string that determines the
exact cryptographic parameters, specific encryption algorithms and key sizes to be used for an
authentication session and consists of three levels:
Key Exchange:
The first part of the Cipher suite string specifies the public key algorithm to be
used. This switch utilizes the Rivest Shamir Adleman (RSA) public key algorithm and the Digital
Signature Algorithm (DSA), specified here as the DHE DSS Diffie-Hellman (DHE) public key
algorithm. This is the first authentication process between client and host as they “exchange keys”
in looking for a match and therefore authentication to be accepted to negotiate encryptions on the
following level.
Encryption:
The second part of the cipher suite that includes the encryption used for encrypting
the messages sent between client and host. The Switch supports two types of cryptology
algorithms:
o
Stream Ciphers
– There are two types of stream ciphers on the Switch, RC4 with 40-bit
keys and RC4 with 128-bit keys. These keys are used to encrypt messages and need to
be consistent between client and host for optimal use.
o
CBC Block Ciphers
– CBC refers to Cipher Block Chaining, which means that a portion
of the previously encrypted block of encrypted text is used in the encryption of the current