Administrator Guide
● aes192-cbc : Force ssh to use the aes192-cbc encryption cipher.
● aes128-ctr : Force ssh to use the aes192-ctr encryption cipher.
● aes128-cbc : Force ssh to use the aes192-cbc encryption cipher.
● 3des-cbc : Force ssh to use 3des-cbc encryption cipher.
With the FIPS mode enabled:
● aes256-ctr : Force ssh to use the aes256-ctr encryption cipher.
● aes256-cbc : Force ssh to use the aes256-cbc encryption cipher.
● aes192-ctr : Force ssh to use the aes192-ctr encryption cipher.
● aes192-cbc : Force ssh to use the aes192-cbc encryption cipher.
● aes128-ctr : Force ssh to use the aes192-ctr encryption cipher.
● aes128-cbc : Force ssh to use the aes192-cbc encryption cipher.
● 3des-cbc : Force ssh to use 3des-cbc encryption cipher.
-l username (OPTIONAL) Enter the keyword —l then the user name used in this SSH session.
The default is the user name of the user associated with the terminal.
-m HMAC
algorithm
Enter one of the following HMAC algorithms to use. (For v2 clients only.):
Without the FIPS mode enabled:
● hmac-sha2-256 : Force ssh to use the hmac-sha2-256 HMAC algorithm.
● hmac-sha1: Force ssh to use the hmac-sha1 HMAC algorithm.
● hmac-shal-96: Force ssh to use the hmac-sha1–96 HMAC algorithm.
● hmac-md5: Force ssh to use the hmac-md5 HMAC algorithm.
● hmac-md5–96: Force ssh to use the hmac-md5–96 HMAC algorithm.
With the FIPS mode enabled:
● hmac-sha2-256 : Force ssh to use the hmac-sha2-256 HMAC algorithm.
● hmac-sha1: Force ssh to use the hmac-sha1 HMAC algorithm.
● hmac-sha1–96: Force ssh to use the hmac-sha1–96 HMAC algorithm.
-p port-number (OPTIONAL) Enter the keyword —p then the port number.
The range is 1 to 65536
The default is 22
-v {1|2} (OPTIONAL) Enter the keyword —v then the SSH version 1 or 2.
The default: The version from the protocol negotiation.
NOTE: If the FIPS mode is enabled, this option does not display in the output.
Defaults As indicated above.
Command Modes EXEC Privilege
Command
History
This guide is platform-specific. For command information about other platforms, refer to the relevant Dell
Networking OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command.
Version Description
9.10(0.0) Removed the support for hmac-sha2-256-96 algorithm.
9.9(0.0) Introduced on the C9010.
9.5(0.1) Introduced on the Z9500.
9.1(0.0) Introduced on the Z9000.
8.3.19.0 Introduced on the S4820T.
8.3.12.0 Introduced on the S4810.
674 FIPS Cryptography