1-8To do… Use the command… RemarksEnter system view system-view —For Stelnetusersssh user username service-type stelnetauthentication-type { password | { any |password-publickey | publickey } assignpublickey keyname }Create anSSH user, andspecify theservice typeandauthenticationmodeFor all usersor SFTP usersssh user username service-type { all | sftp }authentication-type { password | { any |password-publickey | publickey } assignpublickey keyname work-directorydirectory-name }RequiredUse eithercommand.z A user without an SSH account can still pass password authentication and log into the serverthrough Stelnet or SFTP, as long as the user can pass AAA authentication and the service type isSSH.z An SSH server supports up to 1024 SSH users.z The service type of an SSH user can be Stelnet (Secure Telnet) or SFTP (Secure FTP). Forinformation about Stelnet, refer to SSH2.0 Overview. For information about SFTP, refer to SFTPOverview.z For successful login through SFTP, you must set the user service type to sftp or all.z As SSH1 does not support service type sftp, if the client uses SSH1 to log into the server, you mustset the service type to stelnet or all on the server. Otherwise, the client will fail to log in.z The working folder of an SFTP user is subject to the user authentication method. For a user usingonly password authentication, the working folder is the AAA authorized one. For a user using onlypublickey authentication or using both the publickey and password authentication methods, theworking folder is the one set by using the ssh user command.z The configured authentication method takes effect only for users logging in after the configuration.For users using publickey authentication:z You must configure on the device the corresponding username and public keys.z After login, the commands available for a user are determined by the user privilege level, which isconfigured with the user privilege level command on the user interface.For users using password authentication:z You can configure the accounting information either on the device or on the remote authenticationserver (such as RADIUS authentication server).z After login, the commands available to a user are determined by AAA authorization.Setting the SSH Management ParametersSSH management includes: