To do…

Use the command…

Remarks

 

Enter the default

 

 

ISP domain

domain domain-name

 

view

 

 

 

 

 

Apply the

authentication default

 

{ hwtacacs-scheme

 

specified AAA

 

hwtacacs-scheme-name [ local ]

 

scheme to the

 

local none radius-scheme

Configure the

domain

radius-scheme-name [ local ] }

 

authentication

 

 

 

 

mode

 

 

 

Exit to system

quit

 

view

 

 

Optional

By default, the AAA scheme is local.

If you specify the local AAA scheme, perform the configuration concerning local user as well. If you specify an existing scheme by providing the radius-scheme-nameargument, perform the following configuration as well:

For RADIUS and HWTACACS configuration, see the Security Configuration Guide.

Configure the username and password on the AAA server. (For more information, see the Security Configuration Guide.)

Create a local user and enter local

local-user user-name

Required

user view

By default, no local user exists.

 

 

 

 

 

password { cipher simple }

Required

Set the local password

By default, no local password is

password

 

set.

 

 

 

 

 

Specify the command level of the

authorization-attribute level level

Optional

local user

By default, the command level is 0.

 

 

 

 

Specify the service type for the

 

Required

service-type ssh

By default, no service type is

local user

 

specified.

 

 

 

 

 

Return to system view

quit

 

 

 

 

ssh user username service-type

Required

Create an SSH user, and specify

stelnet authentication-type

By default, no SSH user exists, and

the authentication mode for the

{ password { any

no authentication mode is

SSH user

password-publickey publickey }

specified.

 

assign publickey keyname }

 

 

 

 

 

Configure common settings for VTY

 

Optional

See “Configuring common settings

user interfaces

 

for VTY user interfaces (optional).”

 

 

 

 

 

 

 

 

NOTE:

This chapter describes how to configure an SSH client by using password authentication. For more information about SSH and how to configure an SSH client by using publickey, see the Security Configuration Guide.

After you enable command authorization or command accounting, you need to perform the following configuration to make the function take effect:

Create a HWTACACS scheme, and specify the IP address of the authorization server and other authorization parameters.

50