EasyManua.ls Logo

D-Link 3100 24P - DGS Switch - Stackable - Defining SSH Algorithm Settings

D-Link 3100 24P - DGS Switch - Stackable
244 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
DGS-3100 Series Gigabit Stackable Managed Switch User Manual
3. Defi
ne the SSH global setting port number in the Port (1-65535) field.
4. Click
. The SSH configuration is defined, and the device is updated.
Defining SSH Algorithm Settings
This SSH Algorithm Settings Page allows network administrators to enable a public key for SSH authentication encryption.
The following authentication keys are enabled for SSH:
Public Key Algorithm — Encrypts a cryptographic key pair composed of a public key and a private key. The private
key is kept secret, while the public key can be distributed. The encryption keys are mathematically similar, but a private
key cannot be derived from the public key. Messages encrypted with a public key can be decrypted with the matching
private key. The following Public Key Algorithms are supported:
HMAC-RSA — Supports the Hash for Message Authentication Code (HMAC) mechanism utilizing the RSA
encryption algorithm.
HMAC-DSA —Supports the Hash for Message Authentication Code (HMAC) Digital Signature Algorithm
(DSA) encryption algorithm.
Data Integrity Algorithm — Validates message authentication information transmitted between two parties which
share the same key. The following Data Integrity Algorithms are supported:
HMAC-SHA — Supports the Hash for Message Authentication Code (HMAC) Secure Hash Algorithm (SHA)
mechanism.
HMAC MD5 — Supports the Hash for Message Authentication Code (HMAC) MD5 Message Digest (MD5)
mechanism.
Encryption Algorithm — Generates authentication keys used to authenticate communications between different
applications. The following Encryption Algorithms are supported
3DES-CBC Supports a block size of 8 bytes (64 bits); its key size is 192 bits long. The first 8 bytes cannot
be identical to the second 8 bytes, and the second 8 bytes cannot be identical to the third 8 bytes.
AES128 Provides a block cipher that encrypts and decrypts digital information. The AES128 algorithm is
capable of using cryptographic 128 keys.
AES192 Provides a block cipher that encrypts and decrypts digital information. The AES192 algorithm is
capable of using cryptographic 192 keys.
AES256 — Provides a block cipher that encrypts and decrypts digital information. The AES256 algorithm is
capable of using cryptographic 256 keys.
RC4 Supports a cipher with an up to 2048 bits key size.
13
9

Table of Contents

Related product manuals