D-Link DGS-3048 Product Manual - Page 107

SSH Configuration, SSH Algorithm, Current SSH Configuration Settings Window, Parameter

Page 107 highlights

DGS-3048 Gigabit Ethernet Switch Manual The steps required to use the SSH protocol for secure communication between a remote PC (the SSH client) and the Switch (the SSH server) are as follows: 1. Create a user account with admin-level access using the User Accounts window in the Administration folder. This is identical to creating any other admin-level User Account on the Switch, including specifying a password. This password is used to logon to the Switch, once a secure communication path has been established using the SSH protocol. 2. Configure the User Account to use a specified authorization method to identify users that are allowed to establish SSH connections with the Switch using the Current Accounts window (Security > Secure Shell (SSH) > SSH User Authentication). There are three choices for the method SSH will use to authorize the user: HostBased, Password, and Public Key. Otherwise choose the the fourth option, None. 3. Configure the encryption algorithm that SSH will use to encrypt and decrypt messages sent between the SSH client and the SSH server, using the Encryption Algorithm window. 4. Finally, enable SSH on the Switch using the SSH Configuration window. After completing the preceding steps, a SSH Client on a remote PC can be configured to manage the Switch using a secure, in band connection. SSH Configuration The following window is used to configure and view settings for the SSH server and can be opened by clicking Security > Secure Shell (SSH) > SSH Configuration: Figure 10- 20. Current SSH Configuration Settings Window To configure the SSH server on the Switch, modify the following parameters and click Apply: Parameter Description SSH Server Status Port (1-65535) Use the pull-down menu to enable or disable SSH on the Switch. The default is Disabled. The TCP port number currently being utilized by the Switch to connect to the SSH server. The "well-known" TCP port for SSH management is 22. SSH Algorithm This window allows the configuration of the desired types of SSH algorithms used for authentication encryption. There are three categories of algorithms listed and specific algorithms of each may be enabled or disabled by using their corresponding pull-down menus. All algorithms are enabled by default. To open the following window, click Security > Secure Shell (SSH) > SSH Algorithm: 95

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147

DGS-3048 Gigabit Ethernet Switch Manual
The steps required to use the SSH protocol for secure communication between a remote PC (the SSH client) and the Switch
(the SSH server) are as follows:
1.
Create a user account with admin-level access using the
User Accounts
window in the
Administration folder
.
This is identical to creating any other admin-level User Account on the Switch, including specifying a password.
This password is used to logon to the Switch, once a secure communication path has been established using the
SSH protocol.
2.
Configure the User Account to use a specified authorization method to identify users that are allowed to establish
SSH connections with the Switch using the
Current Accounts
window (
Security
>
Secure Shell (SSH)
>
SSH
User Authentication
). There are three choices for the method SSH will use to authorize the user:
HostBased
,
Password
, and
Public Key
. Otherwise choose the the fourth option,
None
.
3.
Configure the encryption algorithm that SSH will use to encrypt and decrypt messages sent between the SSH client
and the SSH server, using the
Encryption Algorithm
window.
4.
Finally, enable SSH on the Switch using the
SSH Configuration
window.
After completing the preceding steps, a SSH Client on a remote PC can be configured to manage the Switch using a secure,
in band connection.
SSH Configuration
The following window is used to configure and view settings for the SSH server and can be opened by clicking
Security >
Secure Shell (SSH) > SSH Configuration:
Figure 10- 20. Current SSH Configuration Settings Window
To configure the SSH server on the Switch, modify the following parameters and click
Apply
:
Parameter
Description
SSH Server Status
Use the pull-down menu to enable or disable SSH on the Switch. The default is
Disabled
.
Port (1-65535)
The TCP port number currently being utilized by the Switch to connect to the SSH
server. The "well-known" TCP port for SSH management is
22
.
SSH Algorithm
This window allows the configuration of the desired types of SSH algorithms used for authentication encryption. There are
three categories of algorithms listed and specific algorithms of each may be enabled or disabled by using their
corresponding pull-down menus. All algorithms are enabled by default. To open the following window, click
Security >
Secure Shell (SSH) > SSH Algorithm:
95