251
ssh2
server
[
port-number
] [
identity-key
{
dsa
|
rsa
} |
prefer-ctos-cipher
{
3des
|
aes128
|
des
} |
prefer-ctos-hmac
{
md5
|
md5-96
|
sha1
|
sha1-96
} |
prefer-kex
{
dh-group-exchange
|
dh-group1
|
dh-group14
} |
prefer-stoc-cipher
{
3des
|
aes128
|
des
} |
prefer-stoc-hmac
{
md5
|
md5-96
|
sha1
|
sha1-96
} ] *
In FIPS mode:
ssh2
server
[
port-number
] [
identity-key
rsa
|
prefer-ctos-cipher
{
aes128
|
aes256
} |
prefer-ctos-hmac
{
sha1
|
sha1-96
} |
prefer-kex dh-group14
|
prefer-stoc-cipher
{
aes128
|
aes256
}
|
prefer-stoc-hmac
{
sha1
|
sha1-96
} ] *
View
User view
Default level
0: Visit level
Parameters
server
: IPv4 address or host name of the server, a case-insensitive string of 1 to 20 characters.
port-number
: Port number of the server, in the range 0 to 65535. The default is 22.
identity-key
: Specifies the algorithm for publickey authentication, either
dsa
or
rsa
. The default is
dsa
.
prefer-ctos-cipher
: Preferred encryption algorithm from client to server, defaulted to
aes128
.
•
3des
: Encryption algorithm 3des-cbc.
•
aes128
: Encryption algorithm aes128-cbc.
•
aes256
: Encryption algorithm aes256-cbc.
•
des
: Encryption algorithm des-cbc.
prefer-ctos-hmac
: Preferred HMAC algorithm from client to server, defaulted to
sha1-96
.
•
md5
: HMAC algorithm hmac-md5.
•
md5-96
: HMAC algorithm hmac-md5-96.
•
sha1
: HMAC algorithm hmac-sha1.
•
sha1-96
: HMAC algorithm hmac-sha1-96.
prefer-kex
: Preferred key exchange algorithm, defaulted to
dh-group-exchange
in non-FIPS mode, and
dh-group14
in FIPS mode.
•
dh-group-exchange
: Key exchange algorithm diffie-hellman-group-exchange-sha1.
•
dh-group1
: Key exchange algorithm diffie-hellman-group1-sha1.
•
dh-group14
: Key exchange algorithm diffie-hellman-group14-sha1.
prefer-stoc-cipher
: Preferred encryption algorithm from server to client, defaulted to
aes128
.
prefer-stoc-hmac
: Preferred HMAC algorithm from server to client, defaulted to
sha1-96
.
Description
Use the
ssh2
command to establish a connection to an IPv4 SSH server and specify the public key
algorithm, the preferred key exchange algorithm, and the preferred encryption algorithm and preferred
HMAC algorithm between the client and server.
When the client's authentication method is publickey, the client needs to get the local private key for
validation. As the publickey authentication includes RSA and DSA algorithms, you must specify an