Service Manual
NOTE: The :: notation specifies successive hexadecimal fields of zeros.
-c encryption cipher Enter the following encryption cipher to use. (For v2 clients only.) Without the FIPS
mode enabled:
• 3des-cbc: Force ssh to use 3des-cbc encryption cipher.
With the FIPS mode enabled:
• aes128–cbc: Force ssh to use the aes128–cbc encryption cipher.
• aes256–cbc: Force ssh to use the aes256–cbc encryption cipher.
-l username (OPTIONAL) Enter the keyword —l then the user name used in this SSH session. The
default is the user name of the user associated with the terminal.
-m HMAC
algorithm
Enter one of the following HMAC algorithms to use. (For v2 clients only.):
Without the FIPS mode enabled:
• hmac-sha1: Force ssh to use the hmac-sha1 HMAC algorithm.
• hmac-shal-96: Force ssh to use the hmac-sha1–96 HMAC algorithm.
• hmac-md5: Force ssh to use the hmac-md5 HMAC algorithm.
• hmac-md5–96: Force ssh to use the hmac-md5–96 HMAC algorithm.
With the FIPS mode enabled:
• hmac-sha1: Force ssh to use the hmac-sha1 HMAC algorithm.
• hmac-sha1–96: Force ssh to use the hmac-sha1–96 HMAC algorithm.
-p port-number (OPTIONAL) Enter the keyword —p then the port number.
The range is 1 to 65536
The default is 22
-v {1|2} (OPTIONAL) Enter the keyword —v then the SSH version 1 or 2.
The default: The version from the protocol negotiation.
NOTE: If the FIPS mode is enabled, this option does not display in the output.
Defaults As indicated above.
Command Modes EXEC Privilege
Command History
Version Description
9.9(0.0) Introduced on the FN IOM.
9.2(0.0) Introduced on the MXL 10/40GbE Switch IO Module.
Example
If FIPS mode is not enabled:
Dell#ssh 10.11.8.12 ?
-c Encryption cipher to use (for v2 client
-l User name option
-m HMAC algorithm to use (for v2 clients only)
-p SSH server port option (default 22)
-v SSH protocol version
466 FIPS Cryptography