User Guide
514
Configuring Access Security
Access Security Configurations
2.1.4 Configuring the SSH Feature
Choose the menu
SECURITY
>
Access Security
>
SSH Config
to load the following page.
Figure 2-7
Configuring the SSH Feature
1) In the
Global Config
section, select
Enable
to enable SSH function and specify
following parameters.
SSH
Select
Enable
to enable the SSH function.
SSH is a protocol working in application layer and transport layer. It can provide a
secure, remote connection to a device. It is more secure than Telnet protocol as it
provides strong encryption.
Downloaded from