276
available only on the A5500 EI Switch Series. If the server is on the public network, do not specify this
keyword and argument combination.
identity-key: Specifies the algorithm for publickey authentication, either dsa or rsa. The default is dsa.
prefer-ctos-cipher: Preferred encryption algorithm from client to server, defaulted to aes128.
ï‚· 3des: Encryption algorithm 3des-cbc.
ï‚· aes128: Encryption algorithm aes128-cbc.
ï‚· des: Encryption algorithm des-cbc.
prefer-ctos-hmac: Preferred HMAC algorithm from client to server, defaulted to sha1-96.
ï‚· md5: HMAC algorithm hmac-md5.
ï‚· md5-96: HMAC algorithm hmac-md5-96.
ï‚· sha1: HMAC algorithm hmac-sha1.
ï‚· sha1-96: HMAC algorithm hmac-sha1-96.
prefer-kex: Preferred key exchange algorithm, defaulted to dh-group-exchange.
ï‚· dh-group-exchange: Key exchange algorithm diffie-hellman-group-exchange-sha1.
ï‚· dh-group1: Key exchange algorithm diffie-hellman-group1-sha1.
ï‚· dh-group14: Key exchange algorithm diffie-hellman-group14-sha1.
prefer-stoc-cipher: Preferred encryption algorithm from server to client, defaulted to aes128.
prefer-stoc-hmac: Preferred HMAC algorithm from server to client, defaulted to sha1-96.
Description
Use the ssh2 command to establish a connection to an IPv4 SSH server and specify the public key
algorithm, the preferred key exchange algorithm, and the preferred encryption algorithm and preferred
HMAC algorithm between the client and server.
When the client’s authentication method is publickey, the client needs to get the local private key for
validation. As the publickey authentication includes RSA and DSA algorithms, you must specify an
algorithm—by using the identity-key keyword—to get the correct data for the local private key. By
default, the encryption algorithm is DSA.
Examples
# Log in to remote SSH2.0 server 10.214.50.51, using the following algorithms:
ï‚· Preferred key exchange algorithm: DH-group1
ï‚· Preferred encryption algorithm from server to client: AES128
ï‚· Preferred HMAC algorithm from client to server: MD5
ï‚· Preferred HMAC algorithm from server to client: SHA1-96
<Sysname> ssh2 10.214.50.51 prefer-kex dh-group1 prefer-stoc-cipher aes128 prefer-ctos-
hmac md5 prefer-stoc-hmac sha1-96
ssh2 ipv6
Syntax
ssh2 ipv6 server [ port-number ] [ identity-key { dsa | rsa } | prefer-ctos-cipher { 3des | aes128 | des }
| prefer-ctos-hmac { md5 | md5-96 | sha1 | sha1-96 } | prefer-kex { dh-group-exchange | dh-group1