Chapter 3
| Network Settings
SSH Setting
– 28 –
◆
Secondary DNS Server
— The IP addresses of the secondary domain name
server.
SSH Setting
The Secure Shell (SSH) can act as a secure replacement for Telnet. The SSH protocol
uses generated public keys to encrypt all data transfers passing between the access
point and SSH-enabled management station clients and ensures that data traveling
over the network arrives unaltered. Clients can then securely use the local user
name and password for access authentication.
Note that SSH client software needs to be installed on the management station to
access the access point for management via the SSH protocol.
Figure 11: SSH Setting
Summary of Contents for ECW5212
Page 8: ...Figures 8...
Page 9: ...9 Tables Table 1 Radio Channels 33 Table 2 Troubleshooting Chart 43...
Page 10: ...Tables 10...
Page 12: ...12 Section I Getting Started...
Page 22: ...Chapter II Web Configuration 22...
Page 26: ...Chapter 2 Status Information Wireless Overview 26...
Page 40: ...Chapter 5 System Settings Maintenance 40...
Page 42: ...42 Section III Appendices...
Page 44: ...Appendix A Troubleshooting Using System Logs 44...
Page 47: ......