
|
| ||
|
|
|
|
|
|
| Check the box to enable the Cast128 encryption algorithm with Cipher Block Chaining. The |
|
|
| default is enabled. |
|
|
|
|
| Twofish128 |
| Check the box to enable the twofish128 encryption algorithm. The default is enabled. |
|
|
|
|
| Twofish192 |
| Check the box to enable the twofish192 encryption algorithm. The default is enabled. |
|
|
|
|
| Twofish256 |
| Check the box to enable the twofish256 encryption algorithm. The default is enabled. |
|
|
|
|
|
|
| Data Integrity Algorithm |
|
|
| Check the box to enable the HMAC (Hash for Message Authentication Code) mechanism |
|
|
| utilizing the Secure Hash algorithm. The default is enabled. |
|
|
|
|
|
|
| Check the box to enable the HMAC (Hash for Message Authentication Code) mechanism |
|
|
| utilizing the MD5 Message Digest encryption algorithm. The default is enabled. |
|
|
|
|
|
|
| Public Key Algorithm |
|
|
| Check the box to enable the HMAC (Hash for Message Authentication Code) mechanism |
|
|
| utilizing the RSA encryption algorithm. The default is enabled. |
|
|
|
|
|
|
| Check the box to enable the HMAC (Hash for Message Authentication Code) mechanism |
|
|
| utilizing the Digital Signature Algorithm encryption. The default is enabled. |
|
|
|
|
Click Apply to implement changes made.
SSH User Authentication Lists
The following windows are used to configure parameters for users attempting to access the Switch through SSH.
To view this window, click Security > SSH > SSH User Authentication Lists as shown below:
Figure 5 - 33 SSH User Authentication Lists window
In the example aboveright, the User Account “RG” has been previously set using the User Accounts window in the Configuratrion folder. A User Account MUST be set in order to set the parameters for the SSH user. To Edit the parameters for a SSH user, click on the corresponding Edit button, which will reveal the following window to configure.
| Figure 5 - 34 SSH User Authentication Lists - Edit window |
The user may set the following parameters: | |
|
|
Parameter | Description |
|
|
User Name | Enter a User Name of no more than 15 characters to identify the SSH user. This User Name |
| must be a previously configured user account on the Switch. |
|
|
Auth. Mode | The administrator may choose one of the following to set the authorization for users |
| attempting to access the Switch. |
| Host Based – This parameter should be chosen if the administrator wishes to use a remote |
| SSH server for authentication purposes. Choosing this parameter requires the user to input |
| the following information to identify the SSH user. |
|
|
| 170 |