xStack® DES-3528/DES-3552 Series Layer 2 Managed Stackable Fast Ethernet Switch Web UI Reference Guide
276
Authfail Attempts (2-
20)
Allows the Administrator to set the maximum number of attempts that a user may try to
log on to the SSH Server utilizing the SSH authentication. After the maximum number of
attempts has been exceeded, the Switch will be disconnected and the user must
reconnect to the Switch to attempt another login. The number of maximum attempts
may be set between 2 and 20. The default setting is 2.
Rekey Timeout
This field is used to set the time period that the Switch will change the security shell
encryptions by using the pull-down menu. The available options are Never, 10 min, 30
min, and 60 min. The default setting is Never.
TCP Port Number (1-
65535)
Here the user can enter the TCP Port Number used for SSH. The default value is 22.
Click the Apply button to accept the changes made for each individual section.
SSH Authentication Method and Algorithm Settings
Users can configure the desired types of SSH algorithms used for authentication encryption. There are three
categories of algorithms listed and specific algorithms of each may be enabled or disabled by ticking their
corresponding check boxes. All algorithms are enabled by default.
To view this window, click Security > SSH > SSH Authentication method and Algorithm Settings, as shown
below:
Figure 8-70 SSH Authentication Method and Algorithm Settings window
The fields that can be configured for SSH Authentication Mode are described below:
Parameter Description
Password
This may be enabled or disabled to choose if the administrator wishes to use a locally
configured password for authentication on the Switch. This parameter is enabled by
default.
Public Key
This may be enabled or disabled to choose if the administrator wishes to use a public
key configuration set on a SSH server, for authentication. This parameter is enabled
by default.
Host-based
This may be enabled or disabled to choose if the administrator wishes to use a host
computer for authentication. This parameter is intended for Linux users requiring SSH
authentication techniques and the host computer is running the Linux operating
system with a SSH program previously installed. This parameter is enabled by default.
Click the Apply button to accept the changes made.