Network diagram, Configuration procedure, Logging in through ssh – H3C Technologies H3C S5120 Series Switches User Manual

Page 66

Advertising
background image

3-13

z

The screen can contain up to 30 lines.

z

The history command buffer can store up to 20 commands.

z

The timeout time of VTY 0 is 6 minutes.

Network diagram

Figure 3-6 Network diagram for Telnet configuration (with the authentication mode being scheme)

Configuration procedure

# Enter system view, and enable the Telnet service.

<Sysname> system-view

[Sysname] telnet server enable

# Create a local user named guest and enter local user view.

[Sysname] local-user guest

# Set the authentication password of the local user to 123456 (in plain text).

[Sysname-luser-guest] password simple 123456

# Set the service type to Telnet.

[Sysname-luser-guest] service-type

# Enter VTY 0 user interface view.

[Sysname] user-interface vty 0

# Configure to authenticate users logging in to VTY 0 in the scheme mode.

[Sysname-ui-vty0] authentication-mode scheme

# Configure Telnet protocol is supported.

[Sysname-ui-vty0] protocol inbound telnet

# Set the maximum number of lines the screen can contain to 30.

[Sysname-ui-vty0] screen-length 30

# Set the maximum number of commands the history command buffer can store to 20.

[Sysname-ui-vty0] history-command max-size 20

# Set the timeout time to 6 minutes.

[Sysname-ui-vty0] idle-timeout 6

Logging In Through SSH

Secure Shell (SSH) offers an approach to logging into a remote device securely. With encryption and

strong authentication, it protects devices against attacks such as IP spoofing and plain text password

interception. For the security features provided by SSH, see SSH Configuration.

Advertising