47
Logging in through SSH
SSH offers an approach to log into a remote device securely. By providing encryption and strong
authentication, it protects devices against attacks such as IP spoofing and plain-text password interception.
The device supports SSH, and you can log in to the device through SSH to remotely manage and maintain
the device, as shown in Figure 15.
Figure 15 SSH login dia
g
ram
The following table shows the configuration requirements of SSH login.
Ob
ect Re
uirements
SSH server
Configure the IP address of the VLAN interface, and make sure the SSH server
and client can reach each other.
Configure the authentication mode and other settings.
SSH client
Run the SSH client program.
Obtain the IP address of the VLAN interface on the server.
By default, the device is enabled with the SSH server and client functions.
⢠On a device that serves as the SSH client, log in to an SSH server to perform operations on the server.
⢠On a device that serves as the SSH server, configure the authentication mode and user level for SSH
users. By default, password authentication is adopted for SSH login, but no login password is
configured, so you cannot log in to the device through SSH by default. Before log in to the device
through SSH, you must log in to the device through the console port and configure the authentication
mode, user level, and common settings.
Configuring the SSH server
NOTE:
This chapter describes how to configure an SSH client by using password authentication. For more
information about SSH and how to configure an SSH client by using publickey, see
Security Confi
uratio
Guide
.
Prerequisites
You have logged in to the device, and want to log in to the device through SSH in the future.
By default, log in to the device through the console port without authentication and have user privilege level
3 after login. For information about logging in to the device with the default configuration, see
āConfiguration requirements.ā