D-Link DXS-3400 Top Of Rack 10 Gigabit Stackable Managed Switches

User Manual - Page 371

For DXS-3400.

PDF File Manual, 490 pages, Read Online | Download pdf file

DXS-3400 photo
Loading ...
Loading ...
Loading ...
DXS-3400 Series Lite Layer 3 Stackable 10GbE Managed Switch Web UI Reference Guide
361
will provide secure encrypted and authenticated communication between two non-trusted hosts. SSH, with its array of
unmatched security features is an essential tool in today’s networking environment. It is a powerful guardian against
numerous existing security hazards that now threaten network communications.
The steps required to use the SSH protocol for secure communication between a remote PC (the SSH client) and the
Switch (the SSH server) are as follows:
• Create a user account with admin-level access using the User Accounts window. This is identical to creating
any other admin-level User Account on the Switch, including specifying a password. This password is used to
logon to the Switch, once a secure communication path has been established using the SSH protocol.
• Configure the User Account to use a specified authorization method to identify users that are allowed to
establish SSH connections with the Switch using the SSH User Authentication Mode window. There are three
choices as to the method SSH will use to authorize the user, which are Host Based, Password, and Public Key.
• Configure the encryption algorithm that SSH will use to encrypt and decrypt messages sent between the SSH
client and the SSH server, using the SSH Authentication Method and Algorithm Settings window.
• Finally, enable SSH on the Switch using the SSH Configuration window.
After completing the preceding steps, a SSH Client on a remote PC can be configured to manage the Switch using a
secure, in band connection.
SSH Global Settings
This window is used to display and configure the SSH global settings.
To view the following window, click Security > SSH > SSH Global Settings, as shown below:
Figure 9-88 SSH Global Settings Window
The fields that can be configured are described below:
Parameter Description
IP SSH Server State
Select to enable or disable the SSH server’s global state.
IP SSH Service Port
Enter the SSH service port number used here. This value must be between 1 and
65535. By default, this number is 22.
Authentication Timeout
Enter the authentication timeout value here. This value must be between 30 and
600 seconds. By default, this value is 120 seconds.
Authentication Retries
Enter the authentication retries value here. This value must be between 1 and 32.
By default, this value is 3.
Click the Apply button to accept the changes made.
Host Key
This window is used to display and generate the SSH host key.
To view the following window, click Security > SSH > Host Key, as shown below:
Loading ...
Loading ...
Loading ...