DGS-3700-12/DGS-3700-12G Series Layer 2 Gigabit Ethernet User Manual
245
AES128-CBC
Tick the check box to enable the Advanced Encryption Standard AES128 encryption
algorithm with Cipher Block Chaining. The default is enabled.
AES192-CBC
Tick the check box to enable the Advanced Encryption Standard AES192 encryption
algorithm with Cipher Block Chaining. The default is enabled.
AES256-CBC
Tick the check box to enable the Advanced Encryption Standard AES-256 encryption
algorithm with Cipher Block Chaining. The default is enabled.
ARC4
Tick the chek box to enable the Arcfour encryption algorithm with Cipher Block Chaining.
The default is enabled.
Cast128-CBC
Tick the check box to enable the Cast128 encryption algorithm with Cipher Block Chaining.
The default is enabled.
Twofish128
Tick the check box to enable the twofish128 encryption algorithm. The default is enabled.
Twofish192
Tick the check box to enable the twofish192 encryption algorithm. The default is enabled.
Twofish256
Tick the check box to enable the twofish256 encryption algorithm. The default is enabled.
Data Integrity Algorithm
HMAC-SHA1
Tick the check box to enable the HMAC (Hash for Message Authentication Code)
mechanism utilizing the Secure Hash algorithm. The default is enabled.
HMAC-MD5
Tick the check box to enable the HMAC (Hash for Message Authentication Code)
mechanism utilizing the MD5 Message Digest encryption algorithm. The default is enabled.
Public Key Algorithm
HMAC-RSA
Tick the check box to enable the HMAC (Hash for Message Authentication Code)
mechanism utilizing the RSA encryption algorithm. The default is enabled.
HMAC-DSA
Tick the check box to enable the HMAC (Hash for Message Authentication Code)
mechanism utilizing the Digital Signature Algorithm encryption. The default is enabled.
Click
Apply
to implement changes made.
SSH User Authentication List
The following windows are used to configure parameters for users attempting to access the Switch through SSH.
To view this window, click
Security > SSH > SSH User Authentication List
,
as shown below:
Figure 8- 57 SSH User Authentication List window
In the example above, the User Account “RG” has been previously set using the User Accounts window in the
Configuration
folder. A User Account MUST be set in order to set the parameters for the SSH user. To Edit the
parameters for a SSH user, click on the corresponding Edit button, which will reveal the following window to configure.
Figure 8- 58 SSH User Authentication Lists (Edit) window
The user may set the following parameters:
Parameter
Description