EasyManua.ls Logo

TP-Link TL-SG5426 User Manual

TP-Link TL-SG5426
499 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #277 background imageLoading...
Page #277 background image
Command Line Interface
4-36
4
The SSH server uses DSA or RSA for key exchange when the client first
establishes a connection with the switch, and then negotiates with the client
to select either DES (56-bit) or 3DES (168-bit) for data encryption.
You must generate the host key before enabling the SSH server.
Example
Related Commands
ip ssh crypto host-key generate (4-38)
show ssh (4-40)
ip ssh timeout
This command configures the timeout for the SSH server. Use the no form to restore
the default setting.
Syntax
ip ssh timeout seconds
no ip ssh timeout
seconds – The timeout for client response during SSH negotiation.
(Range: 1-120)
Default Setting
10 seconds
Command Mode
Global Configuration
Command Usage
The timeout specifies the interval the switch will wait for a response from the
client during the SSH negotiation phase. Once an SSH session has been
established, the timeout for user input is controlled by the exec-timeout
command for vty sessions.
Example
Related Commands
exec-timeout (4-13)
show ip ssh (4-40)
Console#ip ssh crypto host-key generate dsa
Console#configure
Console(config)#ip ssh server
Console(config)#
Console(config)#ip ssh timeout 60
Console(config)#

Table of Contents

Questions and Answers:

TP-Link TL-SG5426 Specifications

General IconGeneral
Switching Capacity52 Gbps
MAC Address Table16K
Standards and ProtocolsIEEE 802.3, IEEE 802.3u, IEEE 802.3ab, IEEE 802.3z, IEEE 802.3x, IEEE 802.1D, IEEE 802.1w, IEEE 802.1s, IEEE 802.1Q, IEEE 802.1p
Forwarding Rate38.7Mpps
Jumbo Frame9KB
Power Supply100-240V AC, 50/60Hz
Dimensions (W x D x H)440 x 220 x 44 mm
MountingRack Mountable
Operating Temperature0°C to 40°C
Storage Temperature-40°C to 70°C
Operating Humidity10% to 90% non-condensing
Storage Humidity5% to 90% non-condensing

Summary

Chapter 1: Introduction

Key Features

Lists key features of the switch, including configuration backup, authentication, and access control lists.

Description of Software Features

Details advanced performance features like flow control, broadcast storm suppression, VLANs, and QoS.

Chapter 2: Initial Configuration

Connecting to the Switch

Explains how to connect to the switch using CLI, Telnet, web interface, and SNMP management.

Basic Configuration

Covers console connection, setting passwords, and configuring IP addresses manually or dynamically.

Chapter 3: Configuring the Switch

Using the Web Interface

Details how to use the embedded HTTP web agent to configure the switch and monitor network activity via a web browser.

Setting the Switch’s IP Address

Describes how to configure an IP interface for management access over the network, including manual and dynamic methods.

Configuring Port Security

Covers enabling port security to control access based on MAC addresses and actions upon violation.

Configuring 802.1X Port Authentication

Explains the IEEE 802.1X standard for port-based access control using user credentials.

Access Control Lists

Describes ACLs for packet filtering based on IP or MAC addresses, and the process of creating and binding them.

Port Configuration

Covers displaying connection status, port information, trunk information, and configuring port settings.

Spanning Tree Algorithm Configuration

Covers configuring STA to detect and disable network loops and provide backup links.

Chapter 4: Command Line Interface

Related product manuals