Encryption Algorithm
Configure SSH encryption algorithms.
AES128-CBC:
Select the checkbox to enable the AES128-CBC algorithm of
SSH.
AES192-CBC:
Select the checkbox to enable the AES192-CBC algorithm of
SSH.
AES256-CBC:
Select the checkbox to enable the AES256-CBC algorithm of
SSH.
Blowfish-CBC:
Select the checkbox to enable the Blowfish-CBC algorithm of
SSH.
Cast128-CBC:
Select the checkbox to enable the Cast128-CBC algorithm of
SSH.
3DES-CBC:
Select the checkbox to enable the 3DES-CBC algorithm of SSH.
Data Integrity Algorithm
Configure SSH data integrity algorithms.
HMAC-SHA1:
Select the checkbox to enable the HMAC-SHA1 algorithm of
SSH.
HMAC-MD5:
Select the checkbox to enable the HMAC-MD5 algorithm of
SSH.
Key Management
You can get the status of the DSA and RSA keys, which can also be generated or deleted
here with the Generate and Delete buttons.
DSA:
The status of SSH-2 DSA key file (PEM Encoded) on the device,
which might be Present or Absent.
RSA:
The status of SSH-1 RSA or SSH-2 RSA key file (PEM Encoded)
on the device, which might be Present or Absent.
Download:
Click the
Download
button to download the desired key file to
the switch.
Key Download
Key Type:
Select the type of SSH Key to download. The switch supports
two types: SSH-2 RSA/DSA and SSH-1 RSA.
Key File:
Please ensure the key length of the downloaded file is in the
range of 512 to 3072 bits.
Download:
Click the
Download
button to download the desired key file to
the switch.
37