D-Link DGS-3048 Product Manual - Page 106
Secure Shell SSH, SSL Configuration Window, Parameter, Description, Status
UPC - 790069287367
View all D-Link DGS-3048 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 106 highlights
DGS-3048 Gigabit Ethernet Switch Manual Figure 10- 19. SSL Configuration Window To set up the SSL function on the Switch, configure the following parameters and click Apply. Parameter Description Status Use the pull-down menu to enable or disable the SSL status on the switch. The default is Disabled. RSA with RC4 128 MD5 This ciphersuite combines the RSA key exchange, stream cipher RC4 encryption with 128-bit keys and the MD5 Hash Algorithm. Use the pull-down menu to enable or disable this ciphersuite. This field is Enabled by default. RSA with 3DES EDE CBC SHA This ciphersuite combines the RSA key exchange, CBC Block Cipher 3DES_EDE encryption and the SHA Hash Algorithm. Use the pull-down menu to enable or disable this ciphersuite. This field is Enabled by default. RSA EXPORT with RC4 40 MD5 This ciphersuite combines the RSA Export key exchange and stream cipher RC4 encryption with 40-bit keys. Use the pull-down menu to enable or disable this ciphersuite. This field is Enabled by default. NOTE: Certain implementations concerning the function and configuration of SSL are not available on the web-based management of this Switch and need to be configured using the command line interface. For more information on SSL and its functions, see the DGS-3048 Command Line Interface Reference Manual, located on the documentation CD of this product. NOTE: Enabling the SSL command will disable the web-based switch management. To log on to the Switch again, the header of the URL must begin with https://. Entering anything else into the address field of the web browser will result in an error and no authentication will be granted. Secure Shell (SSH) SSH is an abbreviation of Secure Shell, which is a program allowing secure remote login and secure network services over an insecure network. It allows a secure login to remote host computers, a safe method of executing commands on a remote end node, and will provide secure encrypted and authenticated communication between two non-trusted hosts. SSH, with its array of unmatched security features is an essential tool in today's networking environment. It is a powerful guardian against numerous existing security hazards that now threaten network communications. 94