D-Link DES-3550 Switch User Manual


 
DES-3550 Fast Ethernet Layer 2 Switch
Figure 7- 21. Ciphersuite window
To set up the SSL function on the Switch, configure the following parameters and click Apply.
Parameter Description
RSA with RC4 128
MD5
This ciphersuite combines the RSA key exchange, stream cipher RC4 encryption with
128-bit keys and the MD5 Hash Algorithm. Use the pull down menu to enable or
disable this ciphersuite. This field is Enabled by default.
RSA with 3DES EDE
CBC SHA
This ciphersuite combines the RSA key exchange, CBC Block Cipher 3DES_EDE
encryption and the SHA Hash Algorithm. Use the pull down menu to enable or disable
this ciphersuite. This field is Enabled by default.
DHS DSS with 3DES
EDE CBC SHA
This ciphersuite combines the DSA Diffie Hellman key exchange, CBC Block Cipher
3DES_EDE encryption and SHA Hash Algorithm. Use the pull down menu to enable
or disable this ciphersuite. This field is Enabled by default.
RSA EXPORT with
RC4 40 MD5
This ciphersuite combines the RSA Export key exchange and stream cipher RC4
encryption with 40-bit keys. Use the pull down menu to enable or disable this
ciphersuite. This field is Enabled by default.
SSL Status
Use the pull down menu to enable or disable the SSL status on the switch. The default
is Disabled.
NOTE: Certain implementations concerning the function and configuration
of SSL are not available on the web-based management of this Switch
and need to be configured using the command line interface. For more
information on SSL and its functions, see the DES-3550 Command Line
Reference Manual, located on the documentation CD of this product.
NOTE: Enabling the SSL command will disable the web-based switch
management. To log on to the Switch again, the header of the URL must
begin with https://. Entering anything else into the address field of the web
browser will result in an error and no authentication will be granted.
Secure Shell (SSH)
SSH is an abbreviation of Secure Shell, which is a program allowing secure remote login and secure network services over
an insecure network. It allows a secure login to remote host computers, a safe method of executing commands on a remote
end node, and will provide secure encrypted and authenticated communication between two non-trusted hosts. SSH, with
its array of unmatched security features is an essential tool in today’s networking environment. It is a powerful guardian
against numerous existing security hazards that now threaten network communications.
127