Chapter 3
| Network Settings
SSH Setting
– 28 –
◆
Secondary DNS Server
— The IP addresses of the secondary domain name
server.
SSH Setting
The Secure Shell (SSH) can act as a secure replacement for Telnet. The SSH protocol
uses generated public keys to encrypt all data transfers passing between the access
point and SSH-enabled management station clients and ensures that data traveling
over the network arrives unaltered. Clients can then securely use the local user
name and password for access authentication.
Note that SSH client software needs to be installed on the management station to
access the access point for management via the SSH protocol.
Figure 11: SSH Setting
Содержание ECW5212
Страница 8: ...Figures 8...
Страница 9: ...9 Tables Table 1 Radio Channels 33 Table 2 Troubleshooting Chart 43...
Страница 10: ...Tables 10...
Страница 12: ...12 Section I Getting Started...
Страница 22: ...Chapter II Web Configuration 22...
Страница 26: ...Chapter 2 Status Information Wireless Overview 26...
Страница 40: ...Chapter 5 System Settings Maintenance 40...
Страница 42: ...42 Section III Appendices...
Страница 44: ...Appendix A Troubleshooting Using System Logs 44...
Страница 47: ......
Страница 48: ...ECW5212 E052016 CS R01 15020000xxxxA...