D-Link DGS-3100-48 Product Manual - Page 165

Defining SSH Algorithm Settings

Page 165 highlights

DGS-3100 Series Gigabit Stackable Managed Switch User Manual Field Description Enable - Enables SSH on the device. Disable - Disables SSH on the device. This is the default value. Port (1-65535) Displays the port number used to authenticate the SSH session. The possible field range is 165535. The field default is 22. 2. Enable or disable the SSH server status in the SSH Server Status field. 3. Define the SSH global setting port number in the Port (1-65535) field. 4. Click . The SSH configuration is defined, and the device is updated. Defining SSH Algorithm Settings This SSH Algorithm Settings Page allows network administrators to enable a public key for SSH authentication encryption. The following authentication keys are enabled for SSH: • Public Key Algorithm - Encrypt a cryptographic key pair composed of a public key and a private key. The private key is kept secret, while the public key can be distributed. The encryption keys are mathematically similar, but a private key cannot be derived from the public key. Messages encrypted with a public key can be decrypted with the matching private key. The following Public Key Algorithms are supported: - HMAC-RSA - Supports the Hash for Message Authentication Code (HMAC) mechanism utilizing the RSA encryption algorithm. - HMAC-DSA -Supports the Hash for Message Authentication Code (HMAC) Digital Signature Algorithm (DSA) encryption algorithm. • Data Integrity Algorithm - Validates message authentication information transmitted between two parties which share the same key. The following Data Integrity Algorithms are supported: - HMAC-SHA - Supports the Hash for Message Authentication Code (HMAC) Secure Hash Algorithm (SHA) mechanism. - HMAC MD5 - Supports the Hash for Message Authentication Code (HMAC) MD5 Message Digest (MD5) mechanism. • Encryption Algorithm - Generates authentication keys used to authenticate communications between different applications. The following Encryption Algorithms are supported - 3DES-CBC - Support a block size of 8 bytes (64 bits); its key size is 192 bits long. The first 8 bytes cannot be identical to the second 8 bytes, and the second 8 bytes cannot be identical to the third 8 bytes. - AES128 -Provide a block cipher that encrypts and decrypts digital information. The AES128 algorithm is capable of using cryptographic 128 keys. - AES192 - Provides a block cipher that encrypts and decrypts digital information. The AES192 algorithm is capable of using cryptographic 192 keys. - AES256 - Provide a block cipher that encrypts and decrypts digital information. The AES256 algorithm is capable of using cryptographic 256 keys. - RC4 - Supports a cipher with an up to 2048 bits key size. 149

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293

DGS-3100 Series Gigabit Stackable Managed Switch User Manual
Field
Description
Enable
— Enables SSH on the device.
Disable
— Disables SSH on the device. This is the default value.
Port (1-65535)
Displays the port number used to authenticate the SSH session. The possible field range is 1-
65535. The field default is 22.
2.
Enable or disable the SSH server status in the
SSH Server Status
field.
3.
Define the SSH global setting port number in the
Port (1-65535)
field.
4.
Click
. The SSH configuration is defined, and the device is updated.
Defining SSH Algorithm Settings
This
SSH Algorithm Settings Page
allows network administrators to enable a public key for SSH authentication encryption.
The following authentication keys are enabled for SSH:
Public Key Algorithm
— Encrypt a cryptographic key pair composed of a public key and a private key. The
private key is kept secret, while the public key can be distributed. The encryption keys are mathematically similar,
but a private key cannot be derived from the public key. Messages encrypted with a public key can be decrypted
with the matching private key. The following Public Key Algorithms are supported:
HMAC-RSA
— Supports the
Hash for Message Authentication Code
(HMAC) mechanism utilizing the RSA
encryption algorithm.
HMAC-DSA
—Supports the Hash for Message Authentication Code (HMAC) Digital Signature Algorithm
(DSA) encryption algorithm.
Data Integrity Algorithm
— Validates message authentication information transmitted between two parties which
share the same key. The following Data Integrity Algorithms are supported:
HMAC-SHA
— Supports the Hash for Message Authentication Code (HMAC) Secure Hash Algorithm (SHA)
mechanism.
HMAC MD5
— Supports the Hash for Message Authentication Code (HMAC) MD5 Message Digest (MD5)
mechanism.
Encryption Algorithm
— Generates authentication keys used to authenticate communications between different
applications. The following Encryption Algorithms are supported
3DES-CBC
Support a block size of 8 bytes (64 bits); its key size is 192 bits long. The first 8 bytes cannot be
identical to the second 8 bytes, and the second 8 bytes cannot be identical to the third 8 bytes.
AES128
Provide a block cipher that encrypts and decrypts digital information. The AES128 algorithm is
capable of using cryptographic 128 keys.
AES192
Provides a block cipher that encrypts and decrypts digital information. The AES192 algorithm is
capable of using cryptographic 192 keys.
AES256
— Provide a block cipher that encrypts and decrypts digital information. The AES256 algorithm is
capable of using cryptographic 256 keys.
RC4
Supports a cipher with an up to 2048 bits key size.
149