Secure Shell (SSH) Configuration
D-Link Unified Wired and Wireless Access System
Oct. 2015 Page 383
D-Link UWS User Manual
• Click Refresh to update the current page with the most current settings and status.
• Click Download Host Keys to link to the File Transfer page for the Host Key download. Note that to
download SSH key files, SSH must be administratively disabled and there can be no active SSH sessions.
• Click Generate RSA Host Keys to begin generating the RSA host keys. Note that to generate SSH key files,
SSH must be administratively disabled and there can be no active SSH session.
• Click Generate DSA Host Key to begin generating the DSA host key. Note that to generate SSH key files,
SSH must be administratively disabled and there can be no active SSH session.
• Click Delete to delete the corresponding key file (RSA or DSA), if it is present.
• If you make changes to the page, click Submit to apply the changes to the system.
Downloading SSH Host Keys
For the switch to accept SSH connections from a management station, the switch needs SSH host keys or
certificates. The switch can generate its own keys or certificates, or you can generate these externally (i.e., off-
line) and download them to the switch.
To download an SSH host key from a TFTP server to the switch, use the instructions in “Downloading SSL
Certificates” on page 380. However, from the File Type field on the File Download page, select one of the
following key file types to download:
• SSH-1 RSA Key File: SSH-1 Rivest-Shamir-Adleman (RSA) Key File.
• SSH-2 RSA Key PEM File: SSH-2 Rivest-Shamir-Adleman (RSA) Key File (PEM Encoded).
• SSH-2 DSA Key PEM File: SSH-2 Digital Signature Algorithm (DSA) Key File (PEM Encoded).
SSH Session Timeout
(Minutes)
This text field is used to configure the inactivity timeout value for incoming
SSH sessions to the switch. The acceptable range for this value is (1-160)
minutes.
Keys Present Displays which keys: RSA, DSA, or both are present (if any).
Key Generation Status Displays which keys: RSA or DSA, are being generated.
Table 222: Secure Shell Configuration Fields (Cont.)
Field Description