66
Examples
# Specify algorithm
aes256-cbc
as the encryption algorithm for SSH2.
<Sysname> system-view
[Sysname] ssh2 algorithm cipher aes256-cbc
Related commands
display ssh2 algorithm
ssh2 algorithm key-exchange
ssh2 algorithm mac
ssh2 algorithm public-key
ssh2 algorithm key-exchange
Use
ssh2 algorithm key-exchange
to specify key exchange algorithms for SSH2.
Use
undo
ssh2 algorithm key-exchange
to restore the default.
Syntax
In non-FIPS mode:
ssh2 algorithm key-exchange
{
dh-group-exchange-sha1
|
dh-group1-sha1
|
dh-group14-sha1
|
ecdh-sha2-nistp256
|
ecdh-sha2-nistp384
}
*
undo ssh2 algorithm key-exchange
In FIPS mode:
ssh2 algorithm key-exchange
{
dh-group14-sha1
|
ecdh-sha2-nistp256
|
ecdh-sha2-nistp384
}
*
undo ssh2 algorithm key-exchange
Default
SSH2
uses key exchange algorithms ecdh-sha2-nistp256,
ecdh-sha2-nistp384,
diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, and diffie-hellman-group1-sha1
in descending order of priority for algorithm negotiation.
Views
System view
Predefined user roles
network-admin
Parameters
dh-group-exchange-sha1
:
Specifies
key exchange algorithm
diffie-hellman-group-exchange-sha1.
dh-group1-sha1
: Specifies key exchange algorithm diffie-hellman-group1-sha1.
dh-group14-sha1
: Specifies key exchange algorithm diffie-hellman-group14-sha1.
ecdh-sha2-nistp256
: Specifies key exchange algorithm ecdh-sha2-nistp256.
ecdh-sha2-nistp384
: Specifies key exchange algorithm ecdh-sha2-nistp384.
Usage guidelines
If you specify the key exchange algorithms, SSH2 uses only the specified algorithms for algorithm
negotiation. The algorithm specified earlier has a higher priority during negotiation.
Summary of Contents for SOHO IE4300
Page 285: ...i Contents Tcl commands 1 cli 1 tclquit 1 tclsh 2...
Page 288: ...i Contents Python commands 1 exit 1 python 1 python filename 2...
Page 291: ...i Contents Automatic configuration commands 1 autodeploy udisk enable 1...
Page 323: ...25 Sysname Ten GigabitEthernet1 0 51 undo shutdown Related commands irf port...
Page 465: ...ii stp vlan enable 55 vlan mapping modulo 55...
Page 602: ...12 Related commands display mvrp statistics...
Page 609: ...i Contents VLAN mapping commands 1 display vlan mapping 1 vlan mapping 2...
Page 678: ...9 Related commands reset pppoe relay statistics...
Page 846: ...i Contents Basic IP forwarding commands 1 display fib 1 ip forwarding table save 2...
Page 1770: ...i Contents Time range commands 1 display time range 1 time range 1...
Page 2026: ...34 Related commands display mac authentication...
Page 2028: ...ii...
Page 2143: ...i Contents User profile commands 1 display user profile 1 user profile 2...
Page 2308: ...61 ipsec transform set...
Page 2531: ...i Contents SAVI commands 1 ipv6 savi down delay 1 ipv6 savi log enable 1 ipv6 savi strict 2...
Page 2534: ...3 Sysname ipv6 savi strict Related commands ipv6 verify source...
Page 2791: ...14 Sysname track 1 Related commands delay display track...
Page 2939: ...9 sntp authentication keyid sntp reliable authentication keyid...
Page 2967: ...27 Related commands apply poe profile poe enable poe max power interface view poe priority...