Managing System
Access Security Configurations
Configuration Guide
61
Max Connect
Specify the maximum number of the connections to the SSH server. New
connection will not be established when the number of the connections reaches
the maximum number you set.
2) In the
Encryption Algorithm
section, select the encryption algorithm you want the
switch to support and click
Apply
.
3) In
Data Integrity Algorithm
section, select the integrity algorithm you want the switch
to support and click
Apply
.
4) In
Key Download
section, select key type from the drop-down list and select the
desired key file to down.
Key Type
Select the key type. The algorithm of the corresponding type is used for both key
generation and authentication.
Key File
Select the desired public key to download to the switch. The key length of the
downloaded file ranges of 512 to 3072 bits.
Note:
It will take a long time to download the key file. Please wait without any operation.
5.1.5 Enabling the Telnet Function
Choose the menu
System
>
Access Security
>
Telnet Config
to load the following page.
Figure 5-4
Configuring the Telnet Function
In the
Global Config
section, select
Enable
and click
Apply
.
Telnet
Select
Enable
to make the Telnet function effective. Telnet function is based on the
Telnet protocol subjected to TCP/IP protocol. It allows users to log on to the switch
remotely.
5.2 Using the CLI
5.2.1 Configuring the Access Control
Follow these steps to configure the access control:
Step 1
configure
Enter global configuration mode.