EasyManua.ls Logo

D-Link DGS-1210-08P - Security > SSH > SSH User Authentication Lists; Security > SSH > SSH Public Key Settings

D-Link DGS-1210-08P
171 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
4 Web-based Switch Configuration D-Link Smart Managed Switch User Manual
9
9
1
1
Public Key Algorithm:
HMAC-RSA: Use the check box to enable the supports of Hash for Message Authentication Code (HMAC)
mechanism utilizing the RSA encryption algorithm.
Click the Apply button to implement changes made.
Security > SSH > SSH User Authentication Lists
The SSH User Authentication Lists page is used to configure parameters for users attempting to access the
Switch through SSH.
Figure 4.117 – Security > SSH > SSH User Authentication Lists
The user may view the following parameters:
User Name: A name of no more than 15 characters to identify the SSH user. This User Name must be a
previously configured user account on the Switch.
Auth. Mode: The administrator may choose one of the following to set the authorization for users attempting
to access the Switch.
Host Based This parameter should be chosen if the administrator wishes to use a remote SSH
server for authentication purposes.
Password This parameter should be chosen if the administrator wishes to use an administrator-
defined password for authentication. Upon entry of this parameter, the Switch will prompt the
administrator for a password, and then to re-type the password for confirmation.
Public Key This parameter should be chosen if the administrator wishes to use the public key on
an SSH server for authentication.
Host Name: Enter an alphanumeric string of no more than 32 characters to identify the remote SSH user.
This parameter is only used in conjunction with the Host Based choice in the Auth. Mode field.
Host IPv4: Enter the corresponding IPv4 address of the SSH user. This parameter is only used in
conjunction with the Host Based choice in the Auth. Mode field.
Host IPv6: Enter the corresponding IPv6 address of the SSH user. This parameter is only used in
conjunction with the Host Based choice in the Auth. Mode field.
Security > SSH > SSH Public Key Settings
The page offers user to use its own generated public key for authentication.
Figure 4.118 – Security > SSH > SSH User Authentication Lists
Use its owned public key/private key provides user more secured and easy method for SSH authentication.
The public key format uses OpenSSH format.

Table of Contents

Other manuals for D-Link DGS-1210-08P

Related product manuals