ssh2 ipv6
Syntax
In non-FIPS mode:
ssh2 ipv6 server [ port-number ] [ identity-key { dsa | rsa } | prefer-ctos-cipher { aes128 | des } | prefer-ctos-hmac { md5 | md5-96 | sha1 | sha1-96 } | prefer-kex { dh-group-exchange | dh-group1 | dh-group14 } | prefer-stoc-cipher { aes128 | des } | prefer-stoc-hmac { md5 | md5-96 | sha1 | sha1-96 } ] *
In FIPS mode:
ssh2 ipv6 server [ port-number ] [ identity-key rsa | prefer-ctos-cipher { aes128 | aes256 } | prefer-ctos-hmac { sha1 | sha1-96 } | prefer-kex dh-group14 | prefer-stoc-cipher { aes128 | aes256 } | prefer-stoc-hmac { sha1 | sha1-96 } ] *
View
User view
Default level
0: Visit level
Parameters
server: Specifies an IPv6 address or host name of the server, a case-insensitive string of 1 to 46 characters.
port-number: Specifies the port number of the server, in the range of 0 to 65535. The default is 22.
identity-key: Specifies the algorithm for publickey authentication, either dsa or rsa. The default is dsa.
prefer-ctos-cipher: Specifies the preferred encryption algorithm from client to server, defaulted to aes128.
aes128: Specifies the encryption algorithm aes128-cbc.
aes256: Specifies the encryption algorithm aes256-cbc.
des: Specifies the encryption algorithm des-cbc.
prefer-ctos-hmac: Specifies the preferred HMAC algorithm from client to server, defaulted to sha1-96.
md5: Specifies the HMAC algorithm hmac-md5.
md5-96: Specifies the HMAC algorithm hmac-md5-96.
sha1: Specifies the HMAC algorithm hmac-sha1.
sha1-96: Specifies the HMAC algorithm hmac-sha1-96.
prefer-kex: Specifies the preferred key exchange algorithm. The default is dh-group-exchange in non-FIPS mode and is dh-group14 in FIPS mode.
dh-group-exchange: Specifies the key exchange algorithm diffie-hellman-group-exchange-sha1.
dh-group1: Specifies the key exchange algorithm diffie-hellman-group1-sha1.
dh-group14: Specifies the key exchange algorithm diffie-hellman-group14-sha1.
prefer-stoc-cipher: Specifies the preferred encryption algorithm from server to client, defaulted to aes128.
prefer-stoc-hmac: Specifies the preferred HMAC algorithm from server to client, defaulted to sha1-96.
Description
Use ssh2 ipv6 to establish a connection to an IPv6 SSH server and specify publickey algorithm, the preferred key exchange algorithm, and the preferred encryption algorithms and preferred HMAC algorithms between the client and server.
When the server adopts publickey authentication to authenticate a client, the client needs to get the local private key for digital signature. As the publickey authentication uses either RSA or DSA algorithm, you must specify an algorithm for the client (by using the identity-key keyword) in order to get the correct data for the local private key.
Examples
# Log in to remote SSH2.0 server 2000::1, using the following connection scheme:
Preferred key exchange algorithm: DH-group1
Preferred encryption algorithm from server to client: AES128
Preferred HMAC algorithm from client to server: MD5
Preferred HMAC algorithm from server to client: SHA1-96
<Sysname> ssh2 ipv6 2000::1 prefer-kex dh-group1 prefer-stoc-cipher aes128 prefer-ctos-hmac md5 prefer-stoc-hmac sha1-96