D-Link DSL-G604T Switch User Manual


 
DGS-3024 Gigabit Ethernet Switch Manual
SSH Algorithm
This window allows the configuration of the desired types of SSH algorithms used for authentication encryption. There are
three categories of algorithms listed and specific algorithms of each may be enabled or disabled by using their corresponding
pull-down menus. All algorithms are enabled by default. To open the following window, click Security > Secure Shell
(SSH) > SSH Algorithm:
Figure 8- 5. Encryption Algorithm window
The following algorithms may be set:
Parameter Description
Encryption Algorithm
3DES-CBC
Use the pull-down to enable or disable the Triple Data Encryption Standard encryption
algorithm with Cipher Block Chaining. The default is Enabled.
Blow-fish CBC
Use the pull-down to enable or disable the Blowfish encryption algorithm with Cipher
Block Chaining. The default is Enabled.
91