T2600G/Security/Access/SSH: Unterschied zwischen den Versionen
Die Seite wurde neu angelegt: „== SSH Config == SSH (Security Shell) provides security and powerful authentication to an unsecured remote management to ensure the management information is protected. ==== Global Config ==== {| class="wikitable sortable options" |- ! Option!!Beschreibung |- | SSH || Enable or disable SSH. SSH is a protocol working in application layer and transport layer. It can provide a secure, remote connection to a device. It is more secure than Telnet protocol as…“ |
Keine Bearbeitungszusammenfassung |
||
Zeile 35: | Zeile 35: | ||
| Key File || Select the desired public key to download to the switch. The key length of the downloaded file ranges of 512 to 3072 bits. | | Key File || Select the desired public key to download to the switch. The key length of the downloaded file ranges of 512 to 3072 bits. | ||
|} | |} | ||
[[Kategorie:T2600G:Security:Access]] |
Version vom 9. Januar 2023, 12:28 Uhr
SSH Config
SSH (Security Shell) provides security and powerful authentication to an unsecured remote management to ensure the management information is protected.
Global Config
Option | Beschreibung |
---|---|
SSH | Enable or disable SSH. SSH is a protocol working in application layer and transport layer. It can provide a secure, remote connection to a device. It is more secure than Telnet protocol as it provides strong encryption. |
Protocol V1 | Enable or disable SSH version 1. |
Protocol V2 | Enable or disable SSH version 2. |
Idle Timeout | Specify the idle timeout time. The system will automatically release the connection when the time is up. |
Maximum Connections | Specify the maximum number of the connections to the SSH server. New connection will not be established when the number of the connections reaches the maximum number you set. |
Port | Specify the port using for SSH. |
Encryption Algorithm
Select the encryption algorithm you want the switch to support and click Apply.
Data Integrity Algorithm
Select the integrity algorithm you want the switch to support and click Apply.
Load Key
Option | Beschreibung |
---|---|
Key Type | Select the key type. The algorithm of the corresponding type is used for both key generation and authentication. |
Key File | Select the desired public key to download to the switch. The key length of the downloaded file ranges of 512 to 3072 bits. |