F3726, F3211, F3174, R5135, R3816-HP Firewalls and UTM Devices System Management and Maintenance Command Reference-6PW100
227
• The preferred encryption algorithm from client to server is aes128.
• The preferred HMAC algorithm from client to server is sha1-96.
• The preferred key exchange algorithm is dh-group14.
• The preferred encryption algorithm from server to client is aes128.
• The preferred HMAC algorithm from server to client is sha1-96.
The following matrix shows the ssh2 ipv6 command and firewalls and UTM devices compatibility:
Hardware Command com
p
atible
F1000-A-EI/F1000-S-EI Yes
F1000-E Yes
F5000 Yes
Firewall module Yes
U200-A Yes
U200-S No
Examples
# Log in to Stelnet server 2000::1, using the following connection scheme:
• The preferred key exchange algorithm: dh-group1.
• The preferred encryption algorithm from server to client: aes128.
• The preferred HMAC algorithm from client to server: md5.
• The preferred HMAC algorithm from server to client: sha1-96.
<Sysname> ssh2 ipv6 2000::1 prefer-kex dh-group1 prefer-stoc-cipher aes128
prefer-ctos-hmac md5 prefer-stoc-hmac sha1-96