DGS-3700-12/DGS-3700-12G Series Layer 2 Gigabit Ethernet Switch User Manual

 

 

 

 

 

Cast128-CBC

 

Check the box to enable the Cast128 encryption algorithm with Cipher Block Chaining. The

 

 

 

default is enabled.

 

 

 

 

 

Twofish128

 

Check the box to enable the twofish128 encryption algorithm. The default is enabled.

 

 

 

 

 

Twofish192

 

Check the box to enable the twofish192 encryption algorithm. The default is enabled.

 

 

 

 

 

Twofish256

 

Check the box to enable the twofish256 encryption algorithm. The default is enabled.

 

 

 

 

 

 

 

Data Integrity Algorithm

 

HMAC-SHA1

 

Check the box to enable the HMAC (Hash for Message Authentication Code) mechanism

 

 

 

utilizing the Secure Hash algorithm. The default is enabled.

 

 

 

 

 

HMAC-MD5

 

Check the box to enable the HMAC (Hash for Message Authentication Code) mechanism

 

 

 

utilizing the MD5 Message Digest encryption algorithm. The default is enabled.

 

 

 

 

 

 

 

Public Key Algorithm

 

HMAC-RSA

 

Check the box to enable the HMAC (Hash for Message Authentication Code) mechanism

 

 

 

utilizing the RSA encryption algorithm. The default is enabled.

 

 

 

 

 

HMAC-DSA

 

Check the box to enable the HMAC (Hash for Message Authentication Code) mechanism

 

 

 

utilizing the Digital Signature Algorithm encryption. The default is enabled.

 

 

 

 

Click Apply to implement changes made.

SSH User Authentication Lists

The following windows are used to configure parameters for users attempting to access the Switch through SSH.

To view this window, click Security > SSH > SSH User Authentication Lists as shown below:

Figure 5 - 33 SSH User Authentication Lists window

In the example aboveright, the User Account “RG” has been previously set using the User Accounts window in the Configuratrion folder. A User Account MUST be set in order to set the parameters for the SSH user. To Edit the parameters for a SSH user, click on the corresponding Edit button, which will reveal the following window to configure.

 

Figure 5 - 34 SSH User Authentication Lists - Edit window

The user may set the following parameters:

 

 

Parameter

Description

 

 

User Name

Enter a User Name of no more than 15 characters to identify the SSH user. This User Name

 

must be a previously configured user account on the Switch.

 

 

Auth. Mode

The administrator may choose one of the following to set the authorization for users

 

attempting to access the Switch.

 

Host Based – This parameter should be chosen if the administrator wishes to use a remote

 

SSH server for authentication purposes. Choosing this parameter requires the user to input

 

the following information to identify the SSH user.

 

 

 

170

Page 181
Image 181
D-Link DGS-3700 user manual SSH User Authentication Lists, HMAC-SHA1, HMAC-MD5, Hmac-Rsa, Hmac-Dsa