Management Guide
Table Of Contents
Chapter 3
| Network Settings
SSH Setting
– 28 –
◆ Secondary DNS Server — The IP addresses of the secondary domain name
server.
SSH Setting
The Secure Shell (SSH) can act as a secure replacement for Telnet. The SSH protocol
uses generated public keys to encrypt all data transfers passing between the access
point and SSH-enabled management station clients and ensures that data traveling
over the network arrives unaltered. Clients can then securely use the local user
name and password for access authentication.
Note that SSH client software needs to be installed on the management station to
access the access point for management via the SSH protocol.
Figure 11: SSH Setting