D-Link DSL-G604T User Manual Page 103

  • Download
  • Add to my manuals
  • Print
  • Page
    / 207
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 102
DGS-3024 Gigabit Ethernet Switch Manual
NOTE: Enabling the SSL command will disable the web-based Switch
management. To log on to the Switch again, the header of the URL must
begin with https://. Entering anything else into the address field of the web
browser will result in an error and no authentication will be granted.
Secure Shell (SSH)
SSH is an abbreviation of Secure Shell, which is a program allowing secure remote login and secure network services over
an insecure network. It allows a secure login to remote host computers, a safe method of executing commands on a remote
end node, and will provide secure encrypted and authenticated communication between two non-trusted hosts. SSH, with its
array of unmatched security features is an essential tool in today’s networking environment. It is a powerful guardian against
numerous existing security hazards that now threaten network communications.
The steps required to use the SSH protocol for secure communication between a remote PC (the SSH client) and the Switch
(the SSH server) are as follows:
1. Create a user account with admin-level access using the User Accounts window in the Security folder. This is
identical to creating any other admin-level User Account on the Switch, including specifying a password. This
password is used to logon to the Switch, once a secure communication path has been established using the SSH
protocol.
2. Configure the User Account to use a specified authorization method to identify users that are allowed to establish
SSH connections with the Switch using the Current Accounts window (Security > Secure Shell (SSH) > SSH
User Authentication). There are three choices for the method SSH will use to authorize the user: HostBased,
Password, and Public Key. Otherwise choose the fourth option, None.
3. Configure the encryption algorithm that SSH will use to encrypt and decrypt messages sent between the SSH client
and the SSH server, using the Encryption Algorithm window.
4. Finally, enable SSH on the Switch using the SSH Configuration window.
After completing the preceding steps, a SSH Client on a remote PC can be configured to manage the Switch using a secure,
in band connection.
SSH Configuration
The following window is used to configure and view settings for the SSH server and can be opened by clicking Security >
Secure Shell (SSH) > SSH Configuration:
89
Page view 102
1 2 ... 98 99 100 101 102 103 104 105 106 107 108 ... 206 207

Comments to this Manuals

No comments