D-Link DGS-1210-12TS/ME [117/159] Security ssh settings ssh user authentication lists

Содержание

Похожие устройства

4 Configuration DGS 1210 series Metro Ethernet Managed Switch User Manual Security SSH Settings SSH User Authentication Lists The SSH User Authentication Lists page is used to configure parameters for users attempting to access the Switch through SSH SSH User Authentication Lists _______________________________________________ O _Sai uuai u Tefal Ent i35 0 Use Mame Auth Moda Host Name Note Maximum 3 entries and I lest heme shou c be less than 22 characters Host P Figure 4 166 Security SSH Settings SSH User Authentication Lists The user may view the following parameters User Name A name of no more than 15 characters to identify the SSH user This User Name must be a previously configured user account on the Switch Auth Mode The administrator may choose one of the following to set the authorization for users attempting to access the Switch Host Based This parameter should be chosen if the administrator wishes to use a remote SSH server for authentication purposes Password This parameter should be chosen if the administrator wishes to use an administratordefined password for authentication Upon entry of this parameter the Switch will prompt the administrator for a password and then to re type the password for confirmation Public Key This parameter should be chosen if the administrator wishes to use the public key on an SSH server for authentication Host Name Enter an alphanumeric string of no more than 32 characters to identify the remote SSH user This parameter is only used in conjunction with the Host Based choice in the Auth Mode field Host IP Enter the corresponding IP address of the SSH user This parameter is only used in conjunction with the Host Based choice in the Auth Mode field MAC based Access Control MAC MAC based Access Control is a method to authenticate and authorize access using either a port or host For port based MAC the method decides port access rights while for host based MAC the method determines the MAC access rights A MAC user must be authenticated before being granted access to a network Both local authentication and remote RADIUS server authentication methods are supported In M AC based Access Control M AC user information in a local database or a RADIUS server data base is searched for authentication Following the authentication result users achieve different levels of Authorization Notes about MAC based Access Control There are certain limitations and regulations regarding MAC based Access Control 1 Once this feature is enabled for a port the Switch will clear the FDB of that port 2 If a port is granted clearance for a MAC address in a VLAN that is not a Guest VLAN other MAC addresses on that port must be authenticated for access and otherwise will be blocked by the Switch 3 A port accepts a maximum of two hundred authenticated MAC addresses per physical port of a VLAN that is not a Guest VLAN Other MAC addresses attempting authentication on a port with the maximum number of authenticated MAC addresses will be blocked 4 Ports that have been enabled for Link Aggregation Port Security or GVRP authentication cannot be enabled for MAC based Authentication Security MAC based Access Control MAC MAC based Access Control Settings The MAC based Access Control Settings page is used to configure the MAC Settings for the MA C based Access Control function on the Switch The user can set the running state method of authentication RA DIUS password view the Guest VLAN configuration to be associated with the MAC based Access Control function of the Switch and configure ports to be enabled or disabled for the MAC based Access Control feature of the Switch Please rem ember ports enabled for certain other features listed previously cannot be enabled for MAC based Access Control 110