Efficient Networks Router family Command line interface Spécifications Page 338

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 366
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 337
Chapter 8: WEB Management Interface Efficient Networks
®
Router family
Technical Reference Guide
Page8-46 Efficient Networks
®
Secure Shell Configuration page
The SSH Configuration page (shown below) allows the user to change the modify the
current SSH setting.
The following parameters are used for the configuration of SSH.
Status - Enables and disables the SSH feature.
Encryption - Provides for the selection of encryption options supported for SSH
communication. The selected method is configured locally on the router (or server).
When a client initiates a session, the encryption type is realized and the client
adheres to the server encryption mode. If the encryption method is not supported on
the client side, the connection will fail. Multiple encryption methods can be selected.
For details of each encryption option, see Encryption Options” on page 5-74.
MAC - Sets the type(s) of Message Authentication Code (MAC) use for SSH
connections.
Port - Specifies the port that the SSH server listens on.
Idle Timeout - Sets the idle timeout period (time an SSH connection can remain idle)
before the SSH session is disconnected.
D-H ReKey Interval - Specifies the interval at which additional key exchanges will be
performed. For more information, see Re-Key Interval” on page 5-74.
Vue de la page 337
1 2 ... 333 334 335 336 337 338 339 340 341 342 343 ... 365 366

Commentaires sur ces manuels

Pas de commentaire