HP 6125XLG R2306-HP 6125XLG Blade Switch Security Command Reference - Page 203

ssh2 ipv6, Usage guidelines, Examples, Syntax, Views, Predefined user roles

Page 203 highlights

faults, use the specified loopback interface as the source interface, and either IP address of the two interfaces as the source IP address. interface interface-type interface-number: Specifies a source interface by its type and number. The primary IPv4 address of this interface is the source IP address to send packets. ip ip-address: Specifies a source IPv4 address. Usage guidelines When the server adopts publickey authentication to authenticate a client, the client must get the local private key for digital signature. Because publickey authentication uses either RSA or DSA algorithm, you must specify a public key algorithm (by using the identity-key keyword) in order to get the correct data for the local private key. Examples # Establish a connection to the IPv4 Stelnet server 3.3.3.3 and specify the public key of the server as svkey. The Stelnet client uses publickey authentication. Use the following algorithms: • Preferred key exchange algorithm: dh-group14. • Preferred server-to-client encryption algorithm: aes128. • Preferred client-to-server HMAC algorithm: sha1. • Preferred server-to-client HMAC algorithm: sha1-96. • Preferred compression algorithm between the server and client: zlib. ssh2 3.3.3.3 prefer-kex dh-group14 prefer-stoc-cipher aes128 prefer-ctos-hmac sha1 prefer-stoc-hmac sha1-96 prefer-compress zlib publickey svkey ssh2 ipv6 Use ssh2 ipv6 to establish a connection to an IPv6 Stelnet server. Syntax In non-FIPS mode: ssh2 ipv6 server [ port-number ] [ vpn-instance vpn-instance-name ] [ -i interface-type interface-number ] [ identity-key { dsa | rsa } | prefer-compress zlib | prefer-ctos-cipher { 3des | aes128 | aes256 | des } | prefer-ctos-hmac { md5 | md5-96 | sha1 | sha1-96 } | prefer-kex { dh-group-exchange | dh-group1 | dh-group14 } | prefer-stoc-cipher { 3des | aes128 | aes256 | des } | prefer-stoc-hmac { md5 | md5-96 | sha1 | sha1-96 } ] * [ publickey keyname | source { interface interface-type interface-number | ipv6 ipv6-address } ] * In FIPS mode: ssh2 ipv6 server [ port-number ] [ vpn-instance vpn-instance-name ] [ -i interface-type interface-number ] [ identity-key rsa | prefer-compress zlib | prefer-ctos-cipher { aes128 | aes256 } | prefer-ctos-hmac { sha1 | sha1-96 } | prefer-kex dh-group14 | prefer-stoc-cipher { aes128 | aes256 } | prefer-stoc-hmac { sha1 | sha1-96 } ] * [ publickey keyname | source { interface interface-type interface-number | ipv6 ipv6-address } ] * Views User view Predefined user roles network-admin 194

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321

194
faults, use the specified loopback interface as the source interface, and either IP address of the two
interfaces as the source IP address.
interface
interface-type interface-number
: Specifies a source interface by its type and number. The
primary IPv4 address of this interface is the source IP address to send packets.
ip
ip-address
: Specifies a source IPv4 address.
Usage guidelines
When the server adopts publickey authentication to authenticate a client, the client must get the local
private key for digital signature. Because publickey authentication uses either RSA or DSA algorithm, you
must specify a public key algorithm (by using the
identity-key
keyword) in order to get the correct data
for the local private key.
Examples
# Establish a connection to the IPv4 Stelnet server
3.3.3.3
and specify the public key of the server as
svkey
. The Stelnet client uses publickey authentication. Use the following algorithms:
Preferred key exchange algorithm:
dh-group14
.
Preferred server-to-client encryption algorithm:
aes128
.
Preferred client-to-server HMAC algorithm:
sha1
.
Preferred server-to-client HMAC algorithm:
sha1-96
.
Preferred compression algorithm between the server and client:
zlib.
<Sysname> ssh2 3.3.3.3 prefer-kex dh-group14 prefer-stoc-cipher aes128 prefer-ctos-hmac
sha1 prefer-stoc-hmac sha1-96 prefer-compress zlib publickey svkey
ssh2 ipv6
Use
ssh2 ipv6
to establish a connection to an IPv6 Stelnet server.
Syntax
In non-FIPS mode:
ssh2
ipv6
server
[
port-number
] [
vpn-instance
vpn-instance-name
] [
-i
interface-type interface-number
]
[
identity-key
{
dsa
|
rsa
} |
prefer-compress
zlib
|
prefer-ctos-cipher
{
3des
|
aes128
|
aes256
|
des
}
|
prefer-ctos-hmac
{
md5
|
md5-96
|
sha1
|
sha1-96
} |
prefer-kex
{
dh-group-exchange
|
dh-group1
|
dh-group14
} |
prefer-stoc-cipher
{
3des
|
aes128
|
aes256
|
des
} |
prefer-stoc-hmac
{
md5
|
md5-96
|
sha1
|
sha1-96
} ] * [
publickey
keyname
|
source
{
interface
interface-type interface-number
|
ipv6
ipv6-address
} ] *
In FIPS mode:
ssh2
ipv6
server
[
port-number
] [
vpn-instance
vpn-instance-name
] [
-i
interface-type interface-number
]
[
identity-key
rsa
|
prefer-compress
zlib
|
prefer-ctos-cipher
{
aes128
|
aes256
} |
prefer-ctos-hmac
{
sha1
|
sha1-96
} |
prefer-kex dh-group14
|
prefer-stoc-cipher
{
aes128
|
aes256
} |
prefer-stoc-hmac
{
sha1
|
sha1-96
} ] * [
publickey
keyname
|
source
{
interface
interface-type interface-number
|
ipv6
ipv6-address
} ] *
Views
User view
Predefined user roles
network-admin