
xStack
®
DGS-3200 Series Layer 2 Managed Gigabit Ethernet Switch Web UI Reference Guide
160
unmatched security features is an essential tool in today’s networking environment. It is a powerful guardian against numerous
existing security hazards that now threaten network communications.
The steps required to use the SSH protocol for secure communication between a remote PC (the SSH client) and the Switch (the
SSH server) are as follows:
1. Create a user account with admin-level access using the User Accounts window (Configuration > Port Configuration
> User Accounts). This is identical to creating any other admin-level User Account on the Switch, including specifying a
password. This password is used to logon to the Switch, once a secure communication path has been established using
the SSH protocol.
2. Configure the User Account to use a specified authorization method to identify users that are allowed to establish SSH
connections with the Switch using the SSH User Authentication Mode window. There are three choices as to the
method SSH will use to authorize the user, which are Host Based, Password, and Public Key.
3. Configure the encryption algorithm that SSH will use to encrypt and decrypt messages sent between the SSH client and
the SSH server, using the SSH Authmode and Algorithm Settings window.
4. Finally, enable SSH on the Switch using the SSH Configuration window.
After completing the preceding steps, a SSH Client on a remote PC can be configured to manage the Switch using a secure, in
band connection.
SSH Settings
Users can configure and view settings for the SSH server.
To view the following window, click Security > SSH > SSH Settings:
Figure 6 - 41. SSH Settings window
To configure the SSH server on the Switch, modify the following parameters and click Apply:
Parameter Description
SSH Server State
Use the radio buttons to enable or disable SSH on the Switch. The default is Disabled.
Max Session (1-8) Enter a value between 1 and 8 to set the number of users that may simultaneously access
the Switch. The default setting is 8.
Connection Timeout
(120-600 sec)
Allows the user to set the connection timeout. The user may set a time between 120 and 600
seconds. The default setting is 120 seconds.
Authfail Attempts (2-
20)
Allows the Administrator to set the maximum number of attempts that a user may try to log
on to the SSH Server utilizing the SSH authentication. After the maximum number of
attempts has been exceeded, the Switch will be disconnected and the user must reconnect
to the Switch to attempt another login. The number of maximum attempts may be set
between 2 and 20. The default setting is 2.
Rekey Timeout
This field is used to set the time period that the Switch will change the security shell
encryptions by using the drop-down menu. The available options are Never, 10 min, 30 min,
and 60 min. The default setting is Never.
TCP Port Number (1-
65535)
Enter the TCP Port Number used for SSH. The default value is 22.
Comentários a estes Manuais