Setting The Dscp Value For Packets Sent By The Ssh Client - HP 3600 v2 Series Configuration Manual

Hide thumbs Also See for 3600 v2 Series:
Table of Contents

Advertisement

Task
Establish a
connection
between the SSH
client and the
server, and specify
the public key
algorithm,
preferred
encryption
algorithm,
preferred HMAC
algorithm and
preferred key
exchange
algorithm.

Setting the DSCP value for packets sent by the SSH client

A field in an IPv4 or IPv6 header contains 8 bits and is used to identify the service type of an IP packet.
In an IPv4 packet, this field is called "Type of Service (ToS)." In an IPv6 packet, this field is called "Traffic
class." According to RFC 2474, the ToS field is redefined as the differentiated services (DS) field, where
a DSCP value is represented by the first six bits (0 to 5) and is in the range 0 to 63. The remaining two
bits (6 and 7) are reserved. When a packet is being transmitted, the network devices can identify its
DSCP value, and determines the transmission priority of the packet according to the DSCP value.
To set the DSCP value for packets sent by the SSH client:
Step
1.
Enter system view.
Command
For an IPv4 server:
In non-FIPS mode:
ssh2 server [ port-number ] [ vpn-instance
vpn-instance-name ] [ identity-key { dsa | ecdsa | rsa } |
prefer-ctos-cipher { 3des | aes128 | des } |
prefer-ctos-hmac { md5 | md5-96 | sha1 | sha1-96 } |
prefer-kex { dh-group-exchange | dh-group1 |
dh-group14 } | prefer-stoc-cipher { 3des | aes128 | des } |
prefer-stoc-hmac { md5 | md5-96 | sha1 | sha1-96 } ] *
In FIPS mode:
ssh2 server [ port-number ] [ vpn-instance
vpn-instance-name ] [ identity-key { ecdsa | rsa } |
prefer-ctos-cipher { aes128 | aes256 } | prefer-ctos-hmac
{ sha1 | sha1-96 } | prefer-kex dh-group14 |
prefer-stoc-cipher { aes128 | aes256 } | prefer-stoc-hmac
{ sha1 | sha1-96 } ] *
For an IPv6 server:
In non-FIPS mode:
ssh2 ipv6 server [ port-number ] [ vpn-instance
vpn-instance-name ] [ identity-key { dsa | ecdsa | rsa } |
prefer-ctos-cipher { 3des | aes128 | des } |
prefer-ctos-hmac { md5 | md5-96 | sha1 | sha1-96 } |
prefer-kex { dh-group-exchange | dh-group1 |
dh-group14 } | prefer-stoc-cipher { 3des | aes128 | des } |
prefer-stoc-hmac { md5 | md5-96 | sha1 | sha1-96 } ] *
In FIPS mode:
ssh2 ipv6 server [ port-number ] [ vpn-instance
vpn-instance-name ] [ identity-key { ecdsa | rsa } |
prefer-ctos-cipher { aes128 | aes256 } | prefer-ctos-hmac
{ sha1 | sha1-96 } | prefer-kex dh-group14 |
prefer-stoc-cipher { aes128 | aes256 } | prefer-stoc-hmac
{ sha1 | sha1-96 } ] *
Command
system-view
315
Remarks
Use one of the
commands in user
view.
Remarks
N/A

Advertisement

Table of Contents
loading

Table of Contents