xStack® DGS-3120 Series Layer 3 Managed Gigabit Ethernet Switch Web UI Reference Guide
392
AES256-CBC
Use the check box to enable or disable the Advanced Encryption Standard AES-256
encryption algorithm with Cipher Block Chaining. The default is enabled.
Cast128-CBC
Use the check box to enable or disable the Cast128 encryption algorithm with
Cipher Block Chaining. The default is enabled.
ARC4
Use the check box to enable or disable the Arcfour encryption algorithm with Cipher
Block Chaining. The default is enabled.
Blow-fish CBC
Use the check box to enable or disable the Blowfish encryption algorithm with
Cipher Block Chaining. The default is enabled.
Twofish128
Use the check box to enable or disable the twofish128 encryption algorithm. The
Twofish192
Use the check box to enable or disable the twofish192 encryption algorithm. The
Twofish256
Use the check box to enable or disable the twofish256 encryption algorithm. The
Click the Apply button to accept the changes made.
The fields that can be configured for the Data Integrity Algorithm are described below:
Parameter Description
HMAC-MD5
Use the check box to enable or disable the HMAC (Hash for Message
Authentication Code) mechanism utilizing the MD5 Message Digest encryption
algorithm. The default is enabled.
HMAC-SHA1
Use the check box to enable or disable the HMAC (Hash for Message
Authentication Code) mechanism utilizing the Secure Hash algorithm. The default is
Click the Apply button to accept the changes made.
The fields that can be configured for the Public Key Algorithm are described below:
Parameter Description
HMAC-RSA
Use the check box to enable or disable the HMAC (Hash for Message
Authentication Code) mechanism utilizing the RSA encryption algorithm. The default
HMAC-DSA
Use the check box to enable or disable the HMAC (Hash for Message
Authentication Code) mechanism utilizing the Digital Signature Algorithm (DSA)
encryption. The default is enabled.
Click the Apply button to accept the changes made.
SSH User Authentication List
Users can configure parameters for users attempting to access the Switch through SSH. In the window above, the
User Account “username” has been previously set using the User Accounts window in the Configuration folder. A
User Account MUST be set in order to set the parameters for the SSH user.
To view this window, click Security > SSH > SSH User Authentication List as shown below:
Figure 8-88 SSH User Authentication List window
The fields that can be configured or displayed are described below: