Page 126 / 160 Scroll up to view Page 121 - 125
DGS-3224TGR Gigabit Ethernet Switch User’s Guide
114
facility values the switch supports now.
Numerical
Facility
Code
0
kernel messages
1
user-level messages
2
mail system
3
system daemons
4
security/authorization messages
5
messages generated internally by syslog line printer subsystem
7
network news subsystem
8
UUCP subsystem
9
clock daemon
10
security/authorization messages
11
FTP daemon
12
NTP subsystem
13
log audit
14
log alert
15
clock daemon
16
local use 0
(local0)
17
local use 1
(local1)
18
local use 2
(local2)
19
local use 3
(local3)
20
local use 4
(local4)
21
local use 5
(local5)
22
local use 6
(local6)
23
local use 7
(local7)
UDP Port
Type the UDP port number used for sending Syslog messages. The default is
514
.
Status
Choose
Enabled
or
Disabled
to activate or deactivate this.
Multicast Configuration
IGMP Snooping Global
Figure 6- 121.
IGMP Snooping State window
Page 127 / 160
DGS-3224TGR Gigabit Ethernet Switch User’s Guide
115
Internet Group Management Protocol (IGMP) snooping allows the switch to recognize IGMP queries and reports sent
between network stations or devices and an IGMP host. When enabled for IGMP snooping, the switch can open or close a
port to a specific device based on IGMP messages passing through the switch.
IGMP Snooping Configurations
Figure 6- 122.
IGMP Snooping Configurations window
Select the desired IGMP snooping configuration and click
Edit
to open the following window:
Figure 6- 123.
IGMP Snooping Configurations – Edit window
To set up IGMP snooping, first change the IGMP Snooping State field to
Enabled
on the IGMP Snooping State window.
Next, enter the desired IGMP snooping configuration settings in the window above. The Query Interval (1-65535) can be
set between
1
and
65,535
seconds and determines the time between IGMP queries. The Max Response (1-25) value allows
a setting between
1
and
25
seconds and specifies the maximum amount of time allowed before sending a response report. A
value between
1
and
255
can be entered for the Robustness Variable (1-255) (the default is
2
). Enabling the Fast Leave
State allows the switch to reduce Leave Delays. Fast Leave operates on a port if an IGMP client connects to the port and
there are no other end nodes detected on that port. In this case, when the client leaves a multicast group, Fast Leave
automatically accelerates the blocking of further, unnecessary multicast traffic from that group to the former IGMP client.
This improves performance by reducing the amount of multicast traffic going through the port to the IGMP client after the
Page 128 / 160
DGS-3224TGR Gigabit Ethernet Switch User’s Guide
116
client leaves a multicast group. Once you have finished making your IGMP snooping configuration settings, click
Apply
to
make the settings effective.
Static Router Port Settings
Figure 6- 124.
Static Router Port Settings window
Select an entry and click
Edit
to access the following window:
Figure 6- 125.
Static Router Port Settings – Edit window
SSH Management
SSH is the abbreviation of Secure Shell, which is a program allowing secure remote login and secure network services over
an insecure network. It allows you to securely login to remote host computers, to execute commands safely in a remote
computer and so forth, and to provide secure encrypted and authenticated communications between two non-trusted hosts.
SSH with its array of unmatched security features is an essential tool in today’s network environment.
It is a powerful guardian against the numerous security hazards that nowadays threaten network communications.
Page 129 / 160
DGS-3224TGR Gigabit Ethernet Switch User’s Guide
117
SSH Configurations
Figure 6- 126.
SSH Configurations window
The SSH configure window contains the global server setting: maximum simultaneous sessions, connection timeout,
maximum fail attempts, authentication method, key re-exchange timeout, the encryption algorithms, data integrality
algorithms and public key algorithms.
The information is described as follows:
Parameter
Description
Maximum Simultaneous Sessions (1 – 8)
Specify how many sessions at most the server program will
handle simultaneously.
Connection Timeout (120 - 600 sec)
Specify how many seconds the connection can survive before
the server automatically ends the connection.
Maximum Fail Attempts (2 – 20)
Specify the maximum number of allowed authentication
attempts before access being denied.
Listened Port Number (1 – 65535)
Specify the TCP port number. TCP ports are numbered
between 1 and 65535. The "well-known" TCP port for the SSH
Page 130 / 160
DGS-3224TGR Gigabit Ethernet Switch User’s Guide
118
protocol is 22.
Authentication Method
Specify the methods of user authentication supported by
server.
Key Re-Exchange Timeout (minute)
Specify how many minutes the parties must process key re-
exchange.
Encryption
Specify the algorithm to use for encryption supported by
server.
3DES:
Use
3DES
encryption.
Blowfish:
Use
Blowfish
encryption.
Data Integrity
Specify the desired MAC algorithm to use for the data integrity
verification.
SHA-1: Use the hmac-sha1 MAC. MD5:
Use the hmac-md5
MAC.
Public Key
Specify the algorithm to use for the public key.
DSA: Use the DSA algorithm. RSA: Use the RSA algorithm.
SSH Account Configuration
Figure 6- 127.
SSH Account Configuration window
Click
New
to open the
SSH Account Configuration – Add
window:
Figure 6- 128.
SSH Account Configuration – Add window

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top