You can log in to the SP from an administration host to perform system management tasks remotely.
The following conditions must be met:
The accounts that can access the SP include the predefined "naroot" account and Data ONTAP user accounts with the credentials of the "admin" role or a role with the login-sp capability.
If you configured the SP to use an IPv4 or IPv6 address, and if five SSH login attempts from a host fail consecutively within 10 minutes, the SP rejects SSH login requests and suspends the communication with the IP address of the host for 15 minutes. The communication resumes after 15 minutes, and you can try to log in to the SP again.
The SP does not support Telnet or RSH. The telnet.enable and rsh.enable options, which enable or disable Telnet and RSH respectively, have no effect on the SP.
The SP ignores the autologout.telnet.timeout and autologout.console.timeout options. The settings for these options do not have any effect on the SP.
For security reasons, the SP prevents you from logging in with the Data ONTAP "root" account. Instead, it maps the Data ONTAP root account to the SP naroot account. If you use the SP naroot account to access the SP, you also use the Data ONTAP root password. Disabling the Data ONTAP root account also disables the SP naroot account.
The following reserved names cannot be used as account names for accessing the SP—"adm", "bin", "cli", "daemon", "ftp", "games", "halt", "lp", "mail", "man", "netapp", "news", "nobody", "operator", "shutdown", "sshd", "sync", "sys", "uucp", and "www".
The SP prompt appears, indicating that you have access to the SP CLI.
[admin_host]$ ssh email@example.com firstname.lastname@example.org's password: SP>
[admin_host]$ ssh email@example.com firstname.lastname@example.org's password: SP>
[admin_host]$ ssh naroot@fd22:8b1e:b255:202::1234 naroot@fd22:8b1e:b255:202::1234's password: SP>
[admin_host]$ ssh naroot@fd22:8b1e:b255:202:2a0:98ff:fe01:7d5b naroot@fd22:8b1e:b255:202:2a0:98ff:fe01:7d5b's password: SP>