To prevent the illegal user from occupying the connection resources, the connections that are not approved will be shut down after the set duration is exceeded.
The ssh server uses the authentication method list of the login type.
Command mode
Global configuration mode
Example
In the following example, an auth-ssh authentication method list is configured and it is applied to the ssh server:
device_config#aaa authentication login auth-ssh local
device_config#ip sshd auth-method auth-ssh