D-Link UWS User Manual
Secure Shell (SSH) Configuration
If you use the command-line interface (CLI) to manage the switch from a remote system, you can use Secure
Shell (SSH) to establish a secure connection. SSH uses public-key cryptography to authenticate the remote
computer.
Secure Shell Configuration
Use the Secure Shell Configuration page to configure the settings for secure command-line based
communication between the management station and the switch.
To display the Secure Shell Configuration page, click LAN > Security > Secure Shell > SSH Configuration in the
navigation menu.
Field
Admin Mode
SSH Version 1
SSH Version 2
SSH Connections in Use
Maximum Number of SSH
Sessions Allowed
D-Link
Oct. 2015
Figure 258: Secure Shell Configuration
Table 222: Secure Shell Configuration Fields
Description
This select field is used to Enable or Disable the administrative mode of SSH.
The currently configured value is shown when the web page is displayed. The
default value is Disable.
This select field is used to Enable or Disable Protocol Level 1 for SSH. The
currently configured value is shown when the web page is displayed. The
default value is Enable.
This select field is used to Enable or Disable Protocol Level 2 for SSH. The
currently configured value is shown when the web page is displayed. The
default value is Enable.
Displays the number of SSH connections currently in use in the system.
This select field is used to configure the maximum number of inbound SSH
sessions allowed on the switch. The currently configured value is shown when
the web page is displayed. The range of acceptable values for this field is (0-5).
Secure Shell (SSH) Configuration
Unified Wired and Wireless Access System
Page 382