Systems Switch User Manual
DGS-3024 Gigabit Ethernet Switch Manual
AES256-CBC
Use the pull-down to enable or disable the Advanced Encryption Standard AES-256
encryption algorithm with Cipher Block Chaining. The default is Enabled.
ARC4
Use the pull-down to enable or disable the Arcfour encryption algorithm with Cipher Block
Chaining. The default is Enabled.
Cast128-CBC
Use the pull-down to enable or disable the Cast128 encryption algorithm with Cipher Block
Chaining. The default is Enabled.
Twofish128
Use the pull-down to enable or disable the twofish128 encryption algorithm. The default is
Enabled.
Twofish192
Use the pull-down to enable or disable the twofish192 encryption algorithm. The default is
Enabled.
Twofish256
Use the pull-down to enable or disable the twofish256 encryption algorithm. The default is
Enabled.
Data Integrity Algorithm
HMAC-SHA1
Use the pull-down to enable or disable the HMAC (Hash for Message Authentication Code)
mechanism utilizing the Secure Hash algorithm. The default is Enabled.
HMAC-MD5
Use the pull-down to enable or disable the HMAC (Hash for Message Authentication Code)
mechanism utilizing the MD5 Message Digest encryption algorithm. The default is Enabled.
Public Key Algorithm
HMAC-RSA
Use the pull-down to enable or disable the HMAC (Hash for Message Authentication Code)
mechanism utilizing the RSA encryption algorithm. The default is Enabled.
HMAC-DSA
Use the pull-down to enable or disable the HMAC (Hash for Message Authentication Code)
mechanism utilizing the Digital Signature Algorithm (DSA) encryption. The default is
Enabled.
Authentication Algorithm
Password
This field may be enabled or disabled to choose if the administrator wishes to use a locally
configured password for authentication on the Switch. This field is Enabled by default.
Public Key
This field may be enabled or disabled to choose if the administrator wishes to use a
publickey configuration set on a SSH server, for authentication. This field is Enabled by
default.
Host-based
This field may be enabled or disabled to choose if the administrator wishes to use a host
computer for authentication. This parameter is intended for Linux users requiring SSH
authentication techniques and the host computer is running the Linux operating system with
a SSH program previously installed. This field is Enabled by default.
Click Apply to implement changes made.
94










