Logging In Through Ssh; Configuring Ssh Login On The Device - HP 10500 Series Configuration Manual

Hide thumbs Also See for 10500 Series:
Table of Contents

Advertisement

Logging in through SSH

SSH offers a secure method to remote login. By providing encryption and strong authentication, it
protects devices against attacks such as IP spoofing and plain text password interception. For more
information, see Security Configuration Guide.
You can use an SSH client to log in to the device for remote management, or use the device as an SSH
client to log in to an SSH server.
By default, SSH login is disabled on the device. To log in to the device through SSH, you must log in to
the device through any other method and configure SSH login on the device first.

Configuring SSH login on the device

This section provides the configuration procedure for when the SSH client authentication method is
password. For more information about SSH and publickey authentication configuration, see Security
Configuration Guide.
To configure SSH login on the device:
Step
1.
Enter system view.
2.
Create local key
pairs.
3.
Enable SSH server.
4.
(Optional.) Create an
SSH user and specify
the authentication
mode.
Command
system-view
public-key local create { dsa |
rsa | ecdsa } [ name
key-name ]
ssh server enable
In non-FIPS mode:
ssh user username
service-type stelnet
authentication-type
{ password | { any |
password-publickey |
publickey } assign
publickey keyname }
In FIPS mode:
ssh user username
service-type stelnet
authentication-type
{ password |
password-publickey assign
publickey keyname }
34
Remarks
N/A
By default, no local key pairs are created.
By default, SSH server is disabled.
By default, no SSH user is configured on the
device.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents