2197

prefer-ctos-hmac: Preferred HMAC algorithm from client to server, defaulted to sha1.

md5: HMAC algorithm hmac-md5.

md5-96: HMAC algorithm hmac-md5-96.

sha1: HMAC algorithm hmac-sha1.

sha1-96: HMAC algorithm hmac-sha1-96.

prefer-kex: Preferred key exchange algorithm, defaulted to dh-group-exchange.

dh-group-exchange: Key exchange algorithm diffie-hellman-group-exchange-sha1.

dh-group1: Key exchange algorithm diffie-hellman-group1-sha1.

dh-group14: Key exchange algorithm diffie-hellman-group14-sha1.

prefer-stoc-cipher: Preferred encryption algorithm from server to client, defaulted to aes128.

prefer-stoc-hmac: Preferred HMAC algorithm from server to client, defaulted to sha1.

Description Use the ssh2 command to establish a connection to an SSH server, and specify the preferred key exchange algorithm, encryption algorithms, and HMAC algorithms of the client and the server.

Note that when the client’s authentication method is publickey, the client needs to get the local private key for validation. As the publickey authentication includes RSA and DSA algorithms, you must specify an algorithm (by using the identity-keykeyword) in order to get the correct data for the local private key.

Example # Login to remote SSH2 server 10.214.50.51, setting the algorithms as follows:

Preferred key exchange algorithm: dh-group1

Preferred encryption algorithm from server to client: AES128

Preferred HMAC algorithm from client to server: MD5

Preferred HMAC algorithm from server to client: SHA1-96.

<Sysname> ssh2 10.214.50.51 prefer-kex dh-group 1 prefer-stoc-cipher

aes128 prefer-ctos-hmac md5 prefer-stoc-hmac sha1-96

ssh2 ipv6

Syntax ssh2 ipv6 server [ port-number] [ identity-key { dsa rsa } prefer-ctos-cipher

{3des aes128 des } prefer-ctos-hmac { md5 md5-96 sha1 sha1-96 } prefer-kex { dh-group-exchange dh-group1 dh-group14 } prefer-stoc-cipher

{3des aes128 des } prefer-stoc-hmac { md5 md5-96 sha1 sha1-96 } ] *

View User view

Page 2197
Image 2197
3Com MSR 50, MSR 30 manual Ssh2 ipv6, 2197