D-Link DGS-1210 Smart Managed Gigabit Switches

User Manual - Page 82

For DGS-1210.

PDF File Manual, 127 pages, Read Online | Download pdf file

DGS-1210 photo
Loading ...
Loading ...
Loading ...
4 Configuration D-Link Smart Managed Switch User Manual
7
7
7
7
Host Based: This parameter may be enabled if the administrator wishes to use a host computer for
authentication. This parameter is intended for Linux users requiring SSH authentication techniques and the
host computer is running the Linux operating system with a SSH program previously installed.
Encryption Algorithm:
3DES-CBC: Use the check box to enable or disable the Triple Data Encryption Standard encryption
algorithm with Cipher Block Chaining. The default is enabled.
Data Integrity Algorithm:
HMAC-MD5: Use the check box to enable the supports of hash for message Authentication Code (HMAC)
MD5 Message Digest (MD5) mechanism.
HMAC-SHA1: Use the check box to enable the supports of hash for message Authentication Code (HMAC)
Secure Hash Algorithm (SHA) mechanism.
Public Key Algorithm:
HMAC-RSA: Use the check box to enable the supports of Hash for Message Authentication Code (HMAC)
mechanism utilizing the RSA encryption algorithm.
Click Apply to implement changes made.
Security > SSH > SSH User Authentication Lists
The SSH User Authentication Lists page is used to configure parameters for users attempting to access the
Switch through SSH.
Figure 4.103Security > SSH > SSH User Authentication Lists
The user may view the following parameters:
User Name: A name of no more than 15 characters to identify the SSH user. This User Name must be a
previously configured user account on the Switch.
Auth. Mode: The administrator may choose one of the following to set the authorization for users attempting
to access the Switch.
Host Based This parameter should be chosen if the administrator wishes to use a remote SSH
server for authentication purposes.
Password This parameter should be chosen if the administrator wishes to use an administrator-
defined password for authentication. Upon entry of this parameter, the Switch will prompt the
administrator for a password, and then to re-type the password for confirmation.
Public Key This parameter should be chosen if the administrator wishes to use the public key on
an SSH server for authentication.
Host Name: Enter an alphanumeric string of no more than 32 characters to identify the remote SSH user.
This parameter is only used in conjunction with the Host Based choice in the Auth. Mode field.
Host IPv4: Enter the corresponding IPv4 address of the SSH user. This parameter is only used in
conjunction with the Host Based choice in the Auth. Mode field.
Host IPv6: Enter the corresponding IPv6 address of the SSH user. This parameter is only used in
conjunction with the Host Based choice in the Auth. Mode field.
Security > Smart Binding > Smart Binding Settings
The primary purpose of Smart Binding is to restrict client access to a switch by enabling administrators to
configure pairs of client MAC and IP addresses that are allowed to access networks through a switch.
Loading ...
Loading ...
Loading ...