D-Link DGS-1520 Dgs-1210 Smart Managed Gigabit Switches

User Manual - Page 490

For DGS-1520.

PDF File Manual, 598 pages, Read Online | Download pdf file

DGS-1520 photo
Loading ...
Loading ...
Loading ...
DGS-1520 Series Gigabit Ethernet Smart Managed Switch Web UI Reference Guide
480
Zone Defense Settings
This window is used to display and configure the Zone Defense settings. When Zone Defense is enabled, the ACL
resources will be reserved for Zone Defense. If the Switch does not have enough ACL resources for Zone Defense, it
cannot be enabled.
Zone Defense is triggered when abnormal network traffic conditions meet pre-configured thresholds on the firewall.
When this happens, the firewall immediately and automatically contacts the Switch and issues commands to them,
which result in blocking any traffic to and from the suspicious host.
To view the following window, click Security > Zone Defense Settings, as shown below:
Figure 9-92 Zone Defense Settings Window
The fields that can be configured are described below:
Parameter Description
State
Select to enable or disable the Zone Defense function here.
Click the Apply button to accept the changes made.
SSH
Secure Shell (SSH) is a program allowing secure remote login and secure network services over an insecure network
that allows a secure login to remote host computers, a safe method of executing commands on a remote end node,
and will provide secure encrypted and authenticated communication between two non-trusted hosts. SSH, with its
array of unmatched security features is an essential tool in today's networking environment. It is a powerful guardian
against numerous existing security hazards that now threaten network communications.
The steps required to use the SSH protocol for secure communication between a remote PC (the SSH client) and the
Switch (the SSH server) are as follows:
• Create a user account with admin-level access using the User Accounts window. This is identical to creating
any other admin-level User Account on the Switch, including specifying a password. This password is used to
logon to the Switch, once a secure communication path has been established using the SSH protocol.
• Configure the User Account to use a specified authorization method to identify users that are allowed to
establish SSH connections with the Switch using the SSH User Authentication Mode window. There are three
choices as to the method SSH will use to authorize the user, which are Host Based, Password, and Public Key.
• Configure the encryption algorithm that SSH will use to encrypt and decrypt messages sent between the SSH
client and the SSH server, using the SSH Authentication Method and Algorithm Settings window.
• Finally, enable SSH on the Switch using the SSH Configuration window.
After completing the preceding steps, a SSH Client on a remote PC can be configured to manage the Switch using a
secure, in band connection.
Loading ...
Loading ...
Loading ...