
xStack
®
DGS-3200 Series Layer 2 Managed Gigabit Ethernet Switch Web UI Reference Guide
162
Block Chaining. The default is enabled.
Twofish128
Use the check box to enable or disable the twofish128 encryption algorithm. The default
is enabled.
Twofish192
Use the check box to enable or disable the twofish192 encryption algorithm. The default
is enabled.
Twofish256
Use the check box to enable or disable the twofish256 encryption algorithm. The default
is enabled.
Data Integrity Algorithm
HMAC-MD5
Use the check box to enable or disable the HMAC (Hash for Message Authentication
Code) mechanism utilizing the MD5 Message Digest encryption algorithm. The default is
enabled.
HMAC-SHA1
Use the check box to enable or disable the HMAC (Hash for Message Authentication
Code) mechanism utilizing the Secure Hash algorithm. The default is enabled.
Public Key Algorithm
HMAC-RSA
Use the check box to enable or disable the HMAC (Hash for Message Authentication
Code) mechanism utilizing the RSA encryption algorithm. The default is enabled.
HMAC-DSA
Use the check box to enable or disable the HMAC (Hash for Message Authentication
Code) mechanism utilizing the Digital Signature Algorithm (DSA) encryption. The default
is enabled.
Click Apply to implement changes made.
SSH User Authentication List
Users can configure parameters for users attempting to access the Switch through SSH. In the window above, the User Account
“username” has been previously set using the User Accounts window in the Configuration folder. A User Account MUST be set
in order to set the parameters for the SSH user.
To view the following window, click Security > SSH > SSH User Authentication List:
Figure 6 - 43. SSH User Authentication List window
The user may view or set the following parameters:
Parameter Description
User Name
A name of no more than 15 characters to identify the SSH user. This User Name must be a
previously configured user account on the Switch.
Authentication
Method
The administrator may choose one of the following to set the authorization for users
attempting to access the Switch.
Host Based – This parameter should be chosen if the administrator wishes to use a remote
SSH server for authentication purposes. Choosing this parameter requires the user to input
the following information to identify the SSH user.
• Host Name – Enter an alphanumeric string of no more than 32 characters to identify
the remote SSH user.
• Host IP – Enter the corresponding IP address of the SSH user.
Password – This parameter should be chosen if the administrator wishes to use an
administrator-defined password for authentication. Upon entry of this parameter, the Switch
will prompt the administrator for a password, and then to re-type the password for
confirmation.
Comentarios a estos manuales