Ssh2 Ipv6 - HP E4510-48G Command Reference Manual

4510g series
Table of Contents

Advertisement

ssh2 ipv6

Syntax
ssh2 ipv6 server [ port-number ] [ identity-key { dsa | rsa } | prefer-ctos-cipher { aes128 | des } |
prefer-ctos-hmac { md5 | md5-96 | sha1 | sha1-96 } | prefer-kex { dh-group-exchange | dh-group1
| dh-group14 } | prefer-stoc-cipher { aes128 | des } | prefer-stoc-hmac { md5 | md5-96 | sha1 |
sha1-96 } ] *
View
User view
Default Level
0: Visit level
Parameters
server: IPv6 address or host name of the server, a case-insensitive string of 1 to 46 characters.
port-number: Port number of the server, in the range 0 to 65535. The default is 22.
identity-key: Specifies the algorithm for publickey authentication, either dsa or rsa. The default is dsa.
prefer-ctos-cipher: Preferred encryption algorithm from client to server, defaulted to aes128.
aes128: Encryption algorithm aes128-cbc.
des: Encryption algorithm des-cbc.
prefer-ctos-hmac: Preferred HMAC algorithm from client to server, defaulted to sha1.
md5: HMAC algorithm hmac-md5.
md5-96: HMAC algorithm hmac-md5-96.
sha1: HMAC algorithm hmac-sha1.
sha1-96: HMAC algorithm hmac-sha1-96.
prefer-kex: Preferred key exchange algorithm, default to dh-group-exchange.
dh-group-exchange: Key exchange algorithm diffie-hellman-group-exchange-sha1.
dh-group1: Key exchange algorithm diffie-hellman-group1-sha1.
dh-group14: Key exchange algorithm diffie-hellman-group14-sha1
prefer-stoc-cipher: Preferred encryption algorithm from server to client, defaulted to aes128.
prefer-stoc-hmac: Preferred HMAC algorithm from server to client, defaulted to sha1.
Description
Use the ssh2 ipv6 command to establish a connection to an IPv6 SSH server and specify public key
algorithm, the preferred key exchange algorithm, and the preferred encryption algorithms and
preferred HMAC algorithms between the client and server.
Note that when the client's authentication method is publickey, the client needs to get the local private
key for validation. As the publickey authentication includes RSA and DSA algorithms, you must specify
an algorithm (by using the identity-key keyword) in order to get the correct data for the local private
key. By default, the encryption algorithm is DSA.
Examples
# Login to remote SSH2.0 server 2000::1, setting the algorithms as follows:
Preferred key exchange algorithm: DH-group1
10-14

Advertisement

Table of Contents
loading

Table of Contents