TP-Link 10GE T1700G-28TQUN V1 User Guide - Page 37

SSH Config

Page 37 highlights

 CipherSuite Config RSA_WITH_RC4_128_MD5: RSA_WITH_RC4_128_SHA: RSA_WITH_DES_CBC_SHA: RSA_WITH_3DES_EDE_CBC_SHA: Key exchange with RC4 128-bit encryption and MD5 for message digest. By default, it's enabled. Key exchange with RC4 128-bit encryption and SHA for message digest. By default, it's enabled. Key exchange with DES-CBC for message encryption and SHA for message digest. By default, it's enabled. Key exchange with 3DES and DES-EDE3-CBC for message encryption and SHA for message digest. By default, it's enabled.  Session Config Session Timeout: If you do nothing with the Web management page within the timeout time, the system will log out automatically. If you want to reconfigure, please login again.  Access User Number Number Control: Admin Number: Guest Number: Select Enable/Disable the Number Control function. Enter the maximum number of the users logging on to the Web management page as Admin. Enter the maximum number of the users logging on to the Web management page as Guest.  Certificate Download Certificate File: Select the desired certificate to download to the switch. The certificate must be BASE64 encoded.  Key Download Key File: Select the desired key to download to the switch. The key must be BASE64 encoded. Note: 1. The SSL certificate and key downloaded must match each other; otherwise the HTTPS connection will not work. 2. To establish a secured connection using https, please enter https:// into the URL field of the browser. 3. It may take more time for https connection than that for http connection, because https connection involves authentication, encryption and decryption etc. 4.4.4 SSH Config As stipulated by IETF (Internet Engineering Task Force), SSH (Secure Shell) is a security protocol established on application and transport layers. SSH-encrypted-connection is similar to a telnet connection, but essentially the old telnet remote management method is not safe, because the password and data transmitted with plain-text can be easily intercepted. SSH can provide 27

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285

CipherSuite Config
RSA_WITH_RC4_128_MD5:
Key exchange with RC4 128-bit encryption and
MD5 for message digest. By default, it’s enabled.
RSA_WITH_RC4_128_SHA:
Key exchange with RC4 128-bit encryption and
SHA for message digest. By default, it’s enabled.
RSA_WITH_DES_CBC_SHA:
Key exchange with DES-CBC for message
encryption and SHA for message digest. By
default, it’s enabled.
RSA_WITH_3DES_EDE_CBC_SHA:
Key exchange with 3DES and DES-EDE3-CBC
for message encryption and SHA for message
digest. By default, it’s enabled.
Session Config
Session Timeout:
If you do nothing with the Web management page within the
timeout time, the system will log out automatically. If you want to
reconfigure, please login again.
Access User Number
Number Control:
Select Enable/Disable the Number Control function.
Admin Number:
Enter the maximum number of the users logging on to the Web
management page as Admin.
Guest Number:
Enter the maximum number of the users logging on to the Web
management page as Guest.
Certificate Download
Certificate File:
Select the desired certificate to download to the switch. The
certificate must be BASE64 encoded.
Key Download
Key File:
Select the desired key to download to the switch. The key must be
BASE64 encoded.
Note:
1.
The SSL certificate and key downloaded must match each other; otherwise the HTTPS
connection will not work.
2.
To establish a secured connection using https, please enter https:// into the URL field of the
browser.
3.
It may take more time for https connection than that for http connection, because https
connection involves authentication, encryption and decryption etc.
4.4.4 SSH Config
As stipulated by IETF (Internet Engineering Task Force), SSH (Secure Shell) is a security protocol
established on application and transport layers. SSH-encrypted-connection is similar to a telnet
connection, but essentially the old telnet remote management method is not safe, because the
password and data transmitted with plain-text can be easily intercepted. SSH can provide
27