Chapter 45 Access Control
Table 153 Management > Access Control > Logins (continued)
LABEL | DESCRIPTION |
Edit Logins |
|
You may configure passwords for up to four users. These users have
User Name | Set a user name (up to 32 ASCII characters long). |
|
|
Password | Enter your new system password. |
|
|
Retype to | Retype your new system password for confirmation |
confirm |
|
|
|
Apply | Click Apply to save your changes to the Switch’s |
| The Switch loses these changes if it is turned off or loses power, so |
| use the Save link on the top navigation panel to save your changes |
| to the |
|
|
Cancel | Click Cancel to begin configuring this screen afresh. |
|
|
45.5 SSH Overview
Unlike Telnet or FTP, which transmit data in clear text, SSH (Secure Shell) is a secure communication protocol that combines authentication and data encryption to provide secure encrypted communication between two hosts over an unsecured network.
Figure 225 SSH Communication Example
408 |
| |
| ||
|
|
|