Administrator Guide

Related
Commands
ip ssh server Configure an SSH server.
show ip ssh
client-pub-keys
Display the client-public keys.
Usage
Information
Both inbound and outbound SSH sessions using IPv4 or IPv6 addressing are supported. Inbound SSH
supports accessing the system through the management interface as well as through a physical Layer 3
interface.
NOTE: Some of the parameters in this command require licensing to access. For more information,
contact your Dell Networking representative.
Example
If FIPS mode is not enabled:
Dell#ssh 10.11.8.12 ?
-c Encryption cipher to use (for v2 clients only)
-l User name option
-m HMAC algorithm to use (for v2 clients only)
-p SSH server port option (default 22)
-v SSH protocol version
<cr>
Dell#ssh 10.11.8.12 -c ?
3des-cbc Force ssh to use 3des-cbc encryption cipher
aes128-cbc Force ssh to use aes128-cbc encryption cipher
aes192-cbc Force ssh to use aes192-cbc encryption cipher
aes256-cbc Force ssh to use aes256-cbc encryption cipher
aes128-ctr Force ssh to use aes128-ctr encryption cipher
aes192-ctr Force ssh to use aes192-ctr encryption cipher
aes256-ctr Force ssh to use aes256-ctr encryption cipher
Dell#ssh 10.11.8.12 -m ?
hmac-md5 Force ssh to use hmac-md5 HMAC algorithm
hmac-md5-96 Force ssh to use hmac-md5-96 HMAC algorithm
hmac-sha1 Force ssh to use hmac-sha1 HMAC algorithm
hmac-sha1-96 Force ssh to use hmac-sha1-96 HMAC algorithm
hmac-sha2-256 Force ssh to use hmac-sha2-256 HMAC algorithm
With FIPS mode enabled:
Dell#ssh 10.11.8.12 ?
-c Encryption cipher to use (for v2 clients only)
-l User name option
-m HMAC algorithm to use (for v2 clients only)
-p SSH server port option (default 22)
<cr>
Dell#ssh 10.11.8.12 -c ?
3des-cbc Force ssh to use 3des-cbc encryption cipher
aes128-cbc Force ssh to use aes128-cbc encryption cipher
aes192-cbc Force ssh to use aes192-cbc encryption cipher
aes256-cbc Force ssh to use aes256-cbc encryption cipher
aes128-ctr Force ssh to use aes128-ctr encryption cipher
aes192-ctr Force ssh to use aes192-ctr encryption cipher
aes256-ctr Force ssh to use aes256-ctr encryption cipher
Dell#ssh 10.11.8.12 -m ?
hmac-sha1 Force ssh to use hmac-sha1 HMAC algorithm
hmac-sha1-96 Force ssh to use hmac-sha1-96 HMAC algorithm
hmac-sha2-256 Force ssh to use hmac-sha2-256 HMAC algorithm
FIPS Cryptography
675