Logging In Through Ssh; Configuring The Ssh Server - HP 5800 Series Configuration Manual

Hide thumbs Also See for 5800 Series:
Table of Contents

Advertisement

Logging in through SSH

SSH offers an approach to log into a remote device securely. By providing encryption and strong
authentication, it protects devices against attacks such as IP spoofing and plain-text password interception.
The device supports SSH, and you can log in to the device through SSH to remotely manage and maintain
the device, as shown in
Figure 15 SSH login diagram
The following table shows the configuration requirements of SSH login.
Object
SSH server
SSH client
By default, the device is enabled with the SSH server and client functions.
On a device that serves as the SSH client, log in to an SSH server to perform operations on the server.
On a device that serves as the SSH server, configure the authentication mode and user level for SSH
users. By default, password authentication is adopted for SSH login, but no login password is
configured, so you cannot log in to the device through SSH by default. Before log in to the device
through SSH, you must log in to the device through the console port and configure the authentication
mode, user level, and common settings.

Configuring the SSH server

NOTE:
This chapter describes how to configure an SSH client by using password authentication. For more
information about SSH and how to configure an SSH client by using publickey, see
Guide
.
Prerequisites
You have logged in to the device, and want to log in to the device through SSH in the future.
By default, log in to the device through the console port without authentication and have user privilege level
3 after login. For information about logging in to the device with the default configuration, see
"Configuration
Figure
15.
Requirements
Configure the IP address of the VLAN interface, and make sure the SSH server
and client can reach each other.
Configure the authentication mode and other settings.
Run the SSH client program.
Obtain the IP address of the VLAN interface on the server.
requirements."
47
Security Configuration

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

5820x seriesA5820x seriesA5800 series

Table of Contents