10-14
ssh2 ipv6
Syntax
ssh2
ipv6
server
[
port-number
] [
identity-key
{
dsa
|
rsa
} |
prefer-ctos-cipher
{
aes128
|
des
} |
prefer-ctos-hmac
{
md5
|
md5-96
|
sha1
|
sha1-96
} |
prefer-kex
{
dh-group-exchange
|
dh-group1
|
dh-group14
} |
prefer-stoc-cipher
{
aes128
|
des
} |
prefer-stoc-hmac
{
md5
|
md5-96
|
sha1
|
sha1-96
} ] *
View
User view
Default Level
0: Visit level
Parameters
server
: IPv6 address or host name of the server, a case-insensitive string of 1 to 46 characters.
port
-
number
: Port number of the server, in the range 0 to 65535. The default is 22.
identity-key
: Specifies the algorithm for publickey authentication, either
dsa
or
rsa
. The default is
dsa
.
prefer-ctos-cipher
: Preferred encryption algorithm from client to server, defaulted to
aes128
.
z
aes128
: Encryption algorithm aes128-cbc.
z
des
: Encryption algorithm des-cbc.
prefer-ctos-hmac
: Preferred HMAC algorithm from client to server, defaulted to
sha1
.
z
md5
: HMAC algorithm hmac-md5.
z
md5-96
: HMAC algorithm hmac-md5-96.
z
sha1
: HMAC algorithm hmac-sha1.
z
sha1-96
: HMAC algorithm hmac-sha1-96.
prefer-kex
: Preferred key exchange algorithm, default to
dh-group-exchange
.
z
dh-group-exchange
: Key exchange algorithm diffie-hellman-group-exchange-sha1.
z
dh-group1
: Key exchange algorithm diffie-hellman-group1-sha1.
z
dh-group14
: Key exchange algorithm diffie-hellman-group14-sha1
prefer-stoc-cipher
: Preferred encryption algorithm from server to client, defaulted to
aes128
.
prefer-stoc-hmac
: Preferred HMAC algorithm from server to client, defaulted to
sha1
.
Description
Use the
ssh2 ipv6
command to establish a connection to an IPv6 SSH server and specify public key
algorithm, the preferred key exchange algorithm, and the preferred encryption algorithms and
preferred HMAC algorithms between the client and server.
Note that when the client’s authentication method is publickey, the client needs to get the local private
key for validation. As the publickey authentication includes RSA and DSA algorithms, you must specify
an algorithm (by using the
identity-key
keyword) in order to get the correct data for the local private
key. By default, the encryption algorithm is DSA.
Examples
# Login to remote SSH2.0 server 2000::1, setting the algorithms as follows:
z
Preferred key exchange algorithm: DH-group1
Summary of Contents for E4510-48G
Page 109: ...2 18 Sysname interface bridge aggregation 1 Sysname Bridge Aggregation1 shutdown ...
Page 309: ...6 4 Sysname interface vlan interface 1 Sysname Vlan interface1 ip address dhcp alloc ...
Page 324: ...8 3 Sysname interface vlan interface 1 Sysname Vlan interface1 ip address bootp alloc ...
Page 530: ...2 5 Sysname mvlan 100 subvlan 10 to 15 ...
Page 739: ...8 15 Sysname system view Sysname port security trap addresslearned ...
Page 819: ...13 11 Sysname system view Sysname public key peer key2 import sshkey key pub ...
Page 914: ...5 17 Sysname reset oam ...
Page 1064: ...5 30 Slot 2 Set next configuration file successfully ...
Page 1325: ...21 13 Examples Redirect to member 2 Sysname irf switch to 2 Sysname Slave 2 ...