Configuration Guide
60
Managing System
Access Security Configurations
Key File
Select the desired Key to download to the switch. The key must be BASE64
encoded. The SSL certificate and key downloaded must match each other
,
otherwise the HTTPS connection will not work.
5.1.4 Configuring the SSH Feature
Choose the menu
System
>
Access Security
>
SSH Config
to load the following page.
Figure 5-3
Configuring the SSH Feature
1) In the
Global Config
section, select
Enable
to enable SSH function and specify other
parameters.
SSH
Select
Enable
to enable the SSH function.
SSH is a protocol working in application layer and transport layer. It can provide a
secure, remote connection to a device. It is more secure than Telnet protocol as it
provides strong encryption.
Protocol V1
Select
Enable
to enable SSH version 1.
Protocol V2
Select
Enable
to enable SSH version 2.
Idle Timeout
Specify the idle timeout time. The system will automatically release the
connection when the time is up.
Содержание TL-SG2424
Страница 26: ...Part 1 Accessing the Switch CHAPTERS 1 Overview 2 Web Interface Access 3 Command Line Interface Access...
Страница 130: ...Part 4 Configuring LAG CHAPTERS 1 LAG 2 LAG Configuration 3 Configuration Example 4 Appendix Default Parameters...
Страница 147: ...Part 5 Monitoring Traffic CHAPTERS 1 Traffic Monitor 2 Appendix Default Parameters...
Страница 449: ...Part 15 Configuring ARP CHAPTERS 1 Overview 2 ARP Configurations...
Страница 508: ...Configuring Voice VLAN Configuration Guide 485...
Страница 768: ...Configuring SNMP RMON Appendix Default Parameters Configuration Guide 745 Parameter Default Setting Status Disable...