D-Link DES-1210-10/ME [89/129] Security ssh settings ssh settings

D-Link DES-1210-10/ME [89/129] Security ssh settings ssh settings
4 Configuration DES-1210 Metro Ethernet Managed Switch User Manual
83
Mirror Port: Specifies the mirror port to be active.
Priority (0-7): Specifies the priority. The priority range is between 0 and 7.
Rx Rate (64-1024000): Specifies the RX rate. The range is between 64 and 1024000.
State: Specify the state to be enabled or disabled.
Click Apply to implement changes made.
Security > DHCP Server Screening > DHCP Server Screening Port Settings
DHCP Server Screening function allows user to restrict the illegal DHCP server by discarding the DHCP
service from distrusted ports. This page allows you to configure the DHCP Server Screening state for each
port and designed trusted DHCP server IP address.
Figure 4.140 Security > DHCP Server Screening > DHCP Server Screening Port Settings
Illegal Server Log Suppress Duration: Specifies the illegal server log suppress duration for DHCP server
screening port.
From Port/ To Port: Specifies a range of ports to be DHCP server screening port.
State: Specifies the DHCP server screening port to be enabled or disabled.
Click Apply to makes effects.
Security > DHCP Server Screening > Filter DHCP Server
This page allows you to designed trusted DHCP Server IP address and Client MAC Address.
Figure 4.141 Security > DHCP Server Screening > Filter DHCP Server
To add the DHCP Trusted DHCP Server, set the following fields and click Add. Or click Delete All to remove
all DHCP Server IP Address.
DHCP Server IP Address: Specifies the IP address of the DHCP server to be trusted.
Client MAC Address: Specifies the MAC address of the Client to be trusted.
Ports: Specifies the ports, or select All Ports.
Security > SSH Settings > SSH Settings
SSH is an abbreviation of Secure Shell, which is a program allowing secure remote login and secure network
services over an insecure network. It allows a secure login to remote host computers, a safe method of
executing commands on a remote end node, and will provide secure encrypted and authenticated
communication between two non-trusted hosts. SSH, with its array of unmatched security features is an

Содержание

Похожие устройства