D-Link DGS-3630 User Manual - Page 104

SSH Server Connection, SSH User Settings, Security > SSH > SSH Server Connection

Page 104 highlights

DGS-3630 Series Layer 3 Stackable Managed Switch Web UI Reference Guide After the key was successfully generated, the following window will appear. Figure 7-24 Host Key (Generating, Success) Window SSH Server Connection This window is used to view the SSH server connections table. To view the following window, click Security > SSH > SSH Server Connection, as shown below: Figure 7-25 SSH Server Connection Window SSH User Settings This window is used to display and configure the SSH user settings. To view the following window, click Security > SSH > SSH User Settings, as shown below: Figure 7-26 SSH User Settings Window The fields that can be configured are described below: Parameter User Name Authentication Method Key File Description Enter the SSH user's username used here. This name can be up to 32 characters long. Select the authentication methods used here. Options to choose from are Password, Public Key, and Host-based. After selecting the Public Key or Host-based option as the Authentication Method, enter the public key here. 97

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184

DGS-3630 Series Layer 3 Stackable Managed Switch Web UI Reference Guide
97
After the key was successfully generated, the following window will appear.
Figure 7-24 Host Key (Generating, Success) Window
SSH Server Connection
This window is used to view the SSH server connections table.
To view the following window, click
Security > SSH > SSH Server Connection
, as shown below:
Figure 7-25 SSH Server Connection Window
SSH User Settings
This window is used to display and configure the SSH user settings.
To view the following window, click
Security > SSH > SSH User Settings
, as shown below:
Figure 7-26 SSH User Settings Window
The fields that can be configured are described below:
Parameter
Description
User Name
Enter the SSH user’s username used here. This name can be up to 32
characters long.
Authentication Method
Select the authentication methods used here. Options to choose from are
Password
,
Public Key
, and
Host-based
.
Key File
After selecting the
Public Key
or
Host-based
option as the
Authentication
Method
, enter the public key here.