3Com MSR 50 Network Router User Manual


  Open as PDF
of 2742
 
2197
prefer-ctos-hmac: Preferred HMAC algorithm from client to server, defaulted to
sha1.
md5: HMAC algorithm hmac-md5.
md5-96: HMAC algorithm hmac-md5-96.
sha1: HMAC algorithm hmac-sha1.
sha1-96: HMAC algorithm hmac-sha1-96.
prefer-kex: Preferred key exchange algorithm, defaulted to
dh-group-exchange.
dh-group-exchange: Key exchange algorithm
diffie-hellman-group-exchange-sha1.
dh-group1: Key exchange algorithm diffie-hellman-group1-sha1.
dh-group14: Key exchange algorithm diffie-hellman-group14-sha1.
prefer-stoc-cipher: Preferred encryption algorithm from server to client,
defaulted to aes128.
prefer-stoc-hmac: Preferred HMAC algorithm from server to client, defaulted to
sha1.
Description Use the
ssh2 command to establish a connection to an SSH server, and specify the
preferred key exchange algorithm, encryption algorithms, and HMAC algorithms
of the client and the server.
Note that when the client’s authentication method is publickey, the client needs to
get the local private key for validation. As the publickey authentication includes
RSA and DSA algorithms, you must specify an algorithm (by using the
identity-key keyword) in order to get the correct data for the local private key.
Example # Login to remote SSH2 server 10.214.50.51, setting the algorithms as follows:
Preferred key exchange algorithm: dh-group1
Preferred encryption algorithm from server to client: AES128
Preferred HMAC algorithm from client to server: MD5
Preferred HMAC algorithm from server to client: SHA1-96.
<Sysname> ssh2 10.214.50.51 prefer-kex dh-group 1 prefer-stoc-cipher
aes128 prefer-ctos-hmac md5 prefer-stoc-hmac sha1-96
ssh2 ipv6
Syntax ssh2 ipv6 server [ port-number ] [ identity-key { dsa | rsa } | prefer-ctos-cipher
{ 3des | aes128 | des } | prefer-ctos-hmac { md5 | md5-96 | sha1 | sha1-96 } |
prefer-kex { dh-group-exchange | dh-group1 | dh-group14 } | prefer-stoc-cipher
{ 3des | aes128 | des } | prefer-stoc-hmac { md5 | md5-96 | sha1 | sha1-96 }] *
View User view