Operation Manual – SSH
H3C S3100-52P Ethernet Switch
Table 1-18 Follow these steps to establish an SSH connection:
To do...
Enter system view
Start the client to
establish a
connection with an
SSH server
Note:
When logging into the SSH server using public key authentication, an SSH client needs
to read its local private key for authentication. As two algorithms (RSA or DSA) are
available, the identity-key keyword must be used to specify one algorithm in order to
get the correct private key.
Use the command...
system-view
ssh2 { host-ip |
host-name } [ port-num ]
[ identity-key { dsa | rsa }
| prefer_kex
{ dh_group1 |
dh_exchange_group } |
prefer_ctos_cipher
{ 3des | des | aes128 } |
prefer_stoc_cipher
{ 3des | des | aes128 } |
prefer_ctos_hmac
{ sha1 | sha1_96 | md5 |
md5_96 } |
prefer_stoc_hmac
{ sha1 | sha1_96 | md5 |
md5_96 } ] *
1-25
Chapter 1 SSH Configuration
Remarks
—
Required
In this command, you can also
specify the preferred key
exchange algorithm, encryption
algorithms and HMAC algorithms
between the server and client.
HMAC: Hash-based message
authentication code
Note that:
The identity-key keyword is
unnecessary
in
authentication and optional in
public key authentication.
Support for the 3des keyword
depends on the number of
encryption bits of the software
version. The 168-bit version
supports this keyword, while
the 56-bit version does not.
password