APC NetBotz 200 Guide de l'utilisateur Page 65

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 125
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 64
®
USER’S GUIDE
NetBotz Rack Monitor 200
59
Console (Administration>Network>Console>
options
)
Option Description
access Choose one of the following for access by Telnet or Secure SHell (SSH):
Disable: Disables all access to the control console.
Enable Telnet (the default): Telnet transmits user names, passwords, and data
without encryption.
Enable SSH v1/v2: Do not enable both versions 1 and 2 of Secure SHell (SSH)
unless you require both. (Security protocols use extensive processing power.)
Enable SSH v1 only: SSH version 1 encrypts user names, passwords, and data
for transmission. There is little or no delay as you log on.
Enable SSH v2 only: SSH version 2 transmits user names, passwords, and data
in encrypted form with more protection than version 1 from attempts to intercept,
forge, or alter data during transmission. There is a noticeable delay as you log on.
Configure the TCP/IP ports to be used by these protocols:
Telnet Port: The Telnet port used to communicate with the Main Module (23 by
default). You can change the port setting to any unused port from 5000 to 32768
for additional security. Users must then use a colon (:) or a space, as required by
your Telnet client program, to specify the non-default port. For example, for port
5000 and an IP address of 152.214.12.114, your Telnet client requires one of the
these commands:
telnet 152.214.12.114:5000
telnet 152.214.12.114 5000
SSH Port: The SSH port used to communicate with the Main Module (22 by
default). You can change the port setting to any unused port from 5000 to 32768
for additional security. See the documentation for your SSH client for the
command line format required to specify a non-default port.
ssh
encryption
Enable or disable encryption algorithms (block ciphers) compatible with SSH
version 1 or version 2 clients:
If your SSH v1 client cannot use Blowfish, you must also enable DES.
Your SSH v2 client selects the enabled algorithm that provides the highest security.
If the client cannot use the default algorithms (3DES or Blowfish), enable an AES
algorithm that it can use (AES 128 or AES 256).
Vue de la page 64
1 2 ... 60 61 62 63 64 65 66 67 68 69 70 ... 124 125

Commentaires sur ces manuels

Pas de commentaire