1-6
Table 1-3
Follow these steps to configure the user interface for SSH clients:
To do...
Use the command...
Remarks
Enter system view
system-view
—
Enter user interface view of
one or more user interfaces
user-interface vty
first-number
[
last-number
]
—
Configure the
authentication mode as
scheme
authentication-mode
scheme
[
command-authorization
]
Required
By default, the user interface
authentication mode is
password.
Specify the supported
protocol(s)
protocol inbound
{
all
|
ssh
|
telnet
}
Optional
By default, both Telnet and
SSH are supported.
z
If you have configured a user interface to support SSH protocol, you must configure AAA
authentication for the user interface by using the
authentication-mode scheme
command to
ensure successful login.
z
On a user interface, if the
authentication-mode password
or
authentication-mode none
command has been executed, the
protocol inbound ssh
command is not available. Similarly, if
the
protocol inbound ssh
command has been executed, the
authentication-mode password
and
authentication-mode none
commands are not available.
Configuring the SSH Management Functions
The SSH server provides a number of management functions. Some functions can prevent illegal
operations such as malicious password guess, further guaranteeing the security of SSH connections.
Table 1-4
Follow these steps to configure SSH management functions:
To do...
Use the command...
Remarks
Enter system view
system-view
—
Set the SSH authentication
timeout time
ssh server timeout
seconds
Optional
By default, the SSH authentication
timeout time is 60 seconds.
Set the number of SSH
authentication retry attempts
ssh server
authentication-retries
times
Optional
By default, the number of SSH
authentication retry attempts is 3.
Set the RSA server key
update interval
ssh server rekey-interval
hours
Optional
By default, the system does not update
the RSA server keys.
Configure a login header
header shell text
Optional
By default, no login header is
configured.