
Chapter 32 Access Control
Table 110 Management > Access Control > Logins (continued)
LABEL | DESCRIPTION |
User Name | Set a user name (up to 32 ASCII characters long). |
|
|
Password | Enter your new system password. |
|
|
Retype to | Retype your new system password for confirmation |
confirm |
|
|
|
Apply | Click Apply to save your changes to the Switch’s |
| The Switch loses these changes if it is turned off or loses power, so |
| use the Save link on the top navigation panel to save your changes |
| to the |
|
|
Cancel | Click Cancel to begin configuring this screen afresh. |
|
|
32.4 SSH Overview
Unlike Telnet or FTP, which transmit data in clear text, SSH (Secure Shell) is a secure communication protocol that combines authentication and data encryption to provide secure encrypted communication between two hosts over an unsecured network.
Figure 156 SSH Communication Example
290 |
| |
| ||
|
|
|