212
To do…
Use the command…
Remarks
Enable the SSH server function
ssh server enable
Required
Disabled by default
Configuring the user interfaces for SSH clients
An SSH client accesses the device through a VTY user interface. You must configure the user interfaces for
SSH clients to allow SSH login. The configuration takes effect only for clients logging in after the
configuration.
Follow these steps to configure the protocols for the current user interface to support:
To do…
Use the command…
Remarks
Enter system view
system-view
—
Enter user interface view of one or
more user interfaces
user-interface
vty
number
[
ending-number
]
—
Set the login authentication mode
to
scheme
authentication-mode
scheme
Required
By default, the authentication
mode is
password
.
Configure the user interface(s) to
support SSH login
protocol inbound
{
all
|
ssh
}
Optional
All protocols are supported by
default.
CAUTION:
For more information about the
authentication-mode
and
protocol inbound
commands, see the
Fundamentals
Command Reference
.
If you configure a user interface to support SSH, be sure to configure the corresponding authentication mode
with the
authentication-mode scheme
command.
For a user interface configured to support SSH, you cannot change the authentication mode. To change the
authentication mode, undo the SSH support configuration first.
Configuring a client public key
NOTE:
This configuration task is only necessary for SSH users using publickey authentication.
For each SSH user that uses publickey authentication to login, you must configure the client’s DSA or RSA
host public key on the server, and configure the client to use the corresponding host private key.
To configure the public key of an SSH client, you can configure it manually or import it from the public
key file:
Configure it manually—You can input or copy the public key to the SSH server. The public key must
be in the distinguished encoding rules (DER) encoding format and have not been converted.
Import it from the public key file—During the import process, the system will automatically convert
the public key to a string coded using the Public Key Cryptography Standards (PKCS). Before