SSH access
Sometimes you'd like more control over your Charge Controller, or you'd like to automate parts of your End-of-Line procedure, or perform advanced operations. That's where the SSH interface comes into play.
Performing actions through SSH comes with its own risks. Only have trained personel perform SSH operations.
We highly recommend disabling SSH access once the initial setup is complete. This improves cyber security.
1. Requirements
- Connect your computer to the Charge Controller through USB (CONFIG USB port) or LAN
2. SSH default credentials
3. Establishing a SSH connection
- Open a terminal that supports the SSH protocol
- SSH into the Charge Controller by running the following command:
ssh charge@<YOUR CHARGE CONTROLLER'S IP ADDRESS>
- Enter the password for the user charge (check above for the default credentials)
You should now be logged in per SSH.
You might get a warning about certificate authenticity. Enter "yes" and press Enter to continue.Example output
The authenticity of host '<IP ADDRESS>' can't be established.
ECDSA key fingerprint is SHA256:<HASH>
Are you sure you want to continue connecting (yes/no/[fingerprint])?
4. Common SSH operations
Most standard Linux commands work on the Charge Controller.
Command | Info |
|---|---|
# | Monitor system logs in real-time |
# | Continuously read log output and filter for OCPP messages |
# | Search for error entries in system logs |
# | Display disk space usage in a human-readable format |
# | Display how long the system has been running and the load average |
# | Display network interfaces and IP addresses |
# | Test network connectivity to a specific host |
# | Check HTTP response headers from a web server |