Ssh2 Ipv6 - HP 3600 v2 Series Command Reference Manual

Hide thumbs Also See for 3600 v2 Series:
Table of Contents

Advertisement

ssh2 ipv6

Syntax
ssh2 ipv6 server [ port-number ] [ identity-key { dsa | rsa } | prefer-ctos-cipher { 3des | aes128 | des }
| prefer-ctos-hmac { md5 | md5-96 | sha1 | sha1-96 } | prefer-kex { dh-group-exchange | dh-group1
| dh-group14 } | prefer-stoc-cipher { 3des | aes128 | des } | prefer-stoc-hmac { md5 | md5-96 | sha1
| sha1-96 } ] *
View
User view
Default level
0: Visit level
Parameters
server: IPv6 address or host name of the server, a case-insensitive string of 1 to 46 characters.
port-number: Port number of the server, in the range of 0 to 65535. The default is 22.
identity-key: Specifies the algorithm for publickey authentication, either dsa or rsa. The default is dsa.
prefer-ctos-cipher: Preferred encryption algorithm from client to server, defaulted to aes128.
3des: Encryption algorithm 3des-cbc.
aes128: Encryption algorithm aes128-cbc.
des: Encryption algorithm des-cbc.
prefer-ctos-hmac: Preferred HMAC algorithm from client to server, defaulted to sha1-96.
md5: HMAC algorithm hmac-md5.
md5-96: HMAC algorithm hmac-md5-96.
sha1: HMAC algorithm hmac-sha1.
sha1-96: HMAC algorithm hmac-sha1-96.
prefer-kex: Preferred key exchange algorithm, default to dh-group-exchange.
dh-group-exchange: Key exchange algorithm diffie-hellman-group-exchange-sha1.
dh-group1: Key exchange algorithm diffie-hellman-group1-sha1.
dh-group14: Key exchange algorithm diffie-hellman-group14-sha1.
prefer-stoc-cipher: Preferred encryption algorithm from server to client, defaulted to aes128.
prefer-stoc-hmac: Preferred HMAC algorithm from server to client, defaulted to sha1-96.
Description
Use the ssh2 ipv6 command to establish a connection to an IPv6 SSH server and specify public key
algorithm, the preferred key exchange algorithm, and the preferred encryption algorithms and preferred
HMAC algorithms between the client and server.
When the client's authentication method is publickey, the client needs to get the local private key for
validation. As the publickey authentication includes RSA and DSA algorithms, you must specify an
algorithm (by using the identity-key keyword) in order to get the correct data for the local private key. By
default, the encryption algorithm is DSA.
Examples
# Log in to remote SSH2.0 server 2000::1, setting the algorithms as follows:
262

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents