31
Logging in through SSH
SSH offers a secure method to remote login. By providing encryption and strong authentication, it
protects devices against attacks such as IP spoofing and plain text password interception. For more
information, see Security Configuration Guide.
You can use an SSH client to log in to the device for remote management, or use the device as an SSH
client to log in to an SSH server.
By default, SSH login is disabled on the device. To log in to the device through SSH, you must log in to
the device through any other method and configure SSH login on the device first.
Configuring SSH login on the device
This section provides the configuration procedure for when the SSH client authentication method is
password. For more information about SSH and publickey authentication configuration, see Security
Configuration Guide.
To configure SSH login on the device:
Ste
Command
Remarks
1. Enter system view.
system-view N/A
2. Create local key
pairs.
public-key local create { dsa |
rsa | ecdsa } [ name
key-name ]
By default, no local key pairs are created.
3. Enable SSH server.
ssh server enable By default, SSH server is disabled.
4. (Optional.) Create an
SSH user and specify
the authentication
mode.
• In non-FIPS mode:
ssh user username
service-type stelnet
authentication-type
{ password | { any |
password-publickey |
publickey } assign
publickey keyname }
• In FIPS mode:
ssh user username
service-type stelnet
authentication-type
{ password |
password-publickey assign
publickey keyname }
By default, no SSH user is configured on the
device.