3-10Figure 3-6 Network diagram for Telnet configuration (with the authentication mode being scheme)3) Configuration procedurez Configure the switch# Enter system view, and enable the Telnet service. system-view[Sysname] telnet server enable# Create a local user named guest and enter local user view.[Sysname] local-user guest# Set the authentication password of the local user to 123456 (in plain text).[Sysname-luser-guest] password simple 123456# Set the service type to Telnet.[Sysname-luser-guest] service-type# Enter VTY 0 user interface view.[Sysname] user-interface vty 0# Configure to authenticate users logging in to VTY 0 in the scheme mode.[Sysname-ui-vty0] authentication-mode scheme# Configure Telnet protocol is supported.[Sysname-ui-vty0] protocol inbound telnet# Set the maximum number of lines the screen can contain to 30.[Sysname-ui-vty0] screen-length 30# Set the maximum number of commands the history command buffer can store to 20.[Sysname-ui-vty0] history-command max-size 20# Set the timeout time to 6 minutes.[Sysname-ui-vty0] idle-timeout 6z Configure the authentication schemeConfigure the authentication server by referring to related parts in AAA Configuration.Logging In Through SSHSecure Shell (SSH) offers an approach to logging into a remote device securely. With encryption andstrong authentication, it protects devices against attacks such as IP spoofing and plain text passwordinterception. For the security features provided by SSH, see SSH Configuration in the Security Volume.