8-8
To do…
Use the command…
Remarks
Enter system view
system-view
—
For Stelnet
users
ssh user username service-type stelnet
authentication-type
{
password
| {
any
|
password-publickey
|
publickey
}
assign
publickey
keyname
}
Create an
SSH user,
and specify
the service
type and
authentication
mode
For all users
or SFTP users
ssh user username service-type
{
all
|
sftp
}
authentication-type
{
password
| {
any
|
password-publickey
|
publickey
}
assign
publickey
keyname
work-directory
directory-name
}
Required
Use either
command.
z
A user without an SSH account can still pass password authentication and log into the server
through Stelnet or SFTP, as long as the user can pass AAA authentication and the service type is
SSH.
z
An SSH server supports up to 1024 SSH users.
z
The service type of an SSH user can be Stelnet (Secure Telnet) or SFTP (Secure FTP). For
information about Stelnet, refer to
SSH2.0 Overview
. For information about SFTP, refer to
SFTP
Overview
.
z
For successful login through SFTP, you must set the user service type to
sftp
or
all
.
z
As SSH1 does not support service type
sftp
,
if the client uses SSH1 to log into the server, you
must set the service type to
stelnet
or
all
on the server. Otherwise, the client will fail to log in.
z
The working folder of an SFTP user is subject to the user authentication method. For a user using
only password authentication, the working folder is the AAA authorized one. For a user using only
publickey authentication or using both the publickey and password authentication methods, the
working folder is the one set by using the
ssh user
command.
z
The configured authentication method takes effect only for users logging in after the configuration.
For users using publickey authentication:
z
You must configure on the device the corresponding username and public keys.
z
After login, the commands available for a user are determined by the user privilege level, which is
configured with the
user privilege level
command on the user interface.
For users using password authentication:
z
You can configure the accounting information either on the device or on the remote authentication
server (such as RADIUS authentication server).
z
After login, the commands available to a user are determined by AAA authorization.
Setting the SSH Management Parameters
SSH management includes: