The stelnet -tunnel lldp command enables you to log in to another device through STelnet when the Layer 3 network is disconnected and Layer 2 links are reachable.
stelnet -tunnel lldp -a source-ip-address -i { interface-type interface-number | interface-name } host-ip-address [ server-port ] [ [ prefer_kex prefer_kex ] | [ prefer_ctos_cipher prefer_ctos_cipher ] | [ prefer_stoc_cipher prefer_stoc_cipher ] | [ prefer_ctos_hmac prefer_ctos_hmac ] | [ prefer_stoc_hmac prefer_stoc_hmac ] | [ prefer_ctos_compress zlib ] | [ prefer_stoc_compress zlib ] | [ -ki interval ] | [ -kc count ] | [ identity-key identity-key-type ] | [ user-identity-key user-key ] ] *
stelnet ipv6 -tunnel lldp -a source-ipv6-address -i { interface-type interface-number | interface-name } host-ipv6-address [ server-port ] [ [ prefer_kex prefer_kex ] | [ prefer_ctos_cipher prefer_ctos_cipher ] | [ prefer_stoc_cipher prefer_stoc_cipher ] | [ prefer_ctos_hmac prefer_ctos_hmac ] | [ prefer_stoc_hmac prefer_stoc_hmac ] | [ prefer_ctos_compress zlib ] | [ prefer_stoc_compress zlib ] | [ -ki interval ] | [ -kc count ] | [ identity-key identity-key-type ] | [ user-identity-key user-key ] ] *
Parameter | Description | Value |
---|---|---|
-i interface-type interface-number |
Specifies the source interface type and number on the local device. |
- |
host-ip-address |
Specifies the IPv4 address of a remote device. |
The value is in dotted decimal notation. |
server-port |
Specifies the TCP port number used by the remote device that functions as the STelnet server. |
The value is an integer ranging from 1 to 65535. The default value is 22. |
prefer_kex prefer_kex |
Specifies the preferred algorithm for key exchange. |
Preferred algorithms for key exchange supported depend on the ssh client key-exchange command settings. |
prefer_ctos_cipher prefer_ctos_cipher |
Specifies the preferred encryption algorithm for packets from the client to the server. |
Encryption algorithms supported depend on the ssh client cipher command settings. |
prefer_stoc_cipher prefer_stoc_cipher |
Specifies the preferred encryption algorithm for packets from the server to the client. |
Encryption algorithms supported depend on the ssh client cipher command settings. |
prefer_ctos_hmac prefer_ctos_hmac |
Specifies the preferred HMAC algorithm for packets from the client to the server. |
Preferred HMAC algorithms supported depend on the ssh client hmac command settings. |
prefer_stoc_hmac prefer_stoc_hmac |
Specifies the preferred HMAC algorithm for packets from the server to the client. |
Preferred HMAC algorithms supported depend on the ssh client hmac command settings. |
prefer_ctos_compress |
Specifies the preferred compression algorithm for packets from the server to the client. Only the ZLIB algorithm is supported. |
- |
zlib |
Specifies the ZLIB algorithm for packets from a client to the server. |
- |
prefer_stoc_compress |
Specifies the preferred compression algorithm for packets from a client to the server. |
- |
-ki interval |
Specifies an interval at which keepalive packets are sent if no data is received. |
The value is an integer ranging from 1 to 3600, in seconds. |
-kc count |
Specifies the maximum number of times that a server does not respond to keepalive packets. |
The value is an integer ranging from 1 to 30. |
identity-key identity-key-type |
Specifies the public key for server authentication. |
Currently, the RSA_SHA2_512, RSA_SHA2_256, RSA, DSA, SM2, and ECC algorithms are supported. The default algorithm is ECC. To ensure high security, do not use the RSA algorithm whose length is less than 2048 digits. You are advised to use RSA SHA2-512 or RSA SHA2-256 authentication algorithm which ensures higher security. |
user-identity-key user-key |
Specifies the public key for user authentication. |
Currently, the RSA_SHA2_512, RSA_SHA2_256, RSA, DSA, SM2, and ECC algorithms are supported. The default algorithm is ECC. To ensure high security, do not use the RSA algorithm whose length is less than 2048 digits. You are advised to use RSA SHA2-512 or RSA SHA2-256 authentication algorithm which ensures higher security. |
ipv6 |
Specifies that the Layer 3 network is an IPv6 network. |
- |
-a source-ip-address |
Specifies the IPv4 address of the local device. Users can use the specified IPv4 address to communicate with the STelnet server to ensure security. |
The value is in dotted decimal notation. |
-a source-ipv6-address |
Specifies the IPv6 address of the local device. Users can use the specified IPv6 address to communicate with the STelnet server to ensure security. |
The value is a 32-digit hexadecimal number, in the format of X:X:X:X:X:X:X:X. |
host-ipv6-address |
Specifies the IPv6 address of a remote device. |
The value is a 32-digit hexadecimal number, in the format of X:X:X:X:X:X:X:X. |
Usage Scenario
If the Layer 3 network between the STelnet client and the server is disconnected but Layer 2 links are normal, you can run the stelnet -tunnel lldp command to log in to the SSH server through STelnet and manage the SSH server.
Prerequisites
Precautions
<HUAWEI> stelnet -tunnel lldp -a 10.1.1.1 -i GigabitEthernet 0/1/0 10.0.1.2 Trying 10.0.1.2 ... Press CTRL+K to abort Connected to 10.0.1.2 ... Please input the username: john Enter password:
<HUAWEI> stelnet ipv6 -tunnel lldp -a 2001:db8:2::2 -i GigabitEthernet 0/1/0 2001:db8:1::1 Trying 2001:db8:1::1 ... Press CTRL+K to abort Connected to 2001:db8:1::1 ... Please input the username: john Enter password: