Administrator Guide

Table Of Contents
aes256-ctr : Force ssh to use aes256-ctr encryption
cipher
-l username (OPTIONAL) Enter the keyword -l then the user name used
in this SSH session. The default is the user name of the user
associated with the terminal.
-m HMAC
algorithm
Enter one of the following HMAC algorithms to use. (For v2
clients only):
"no fips mode enable"(disable) will support v1 & v2 client.
hmac-md5: Force ssh to use hmac-md5 HMAC algorithm.
hmac-md5-96: Force ssh to use hmac-md5-96 HMAC
algorithm.
hmac-sha1: Force ssh to use hmac-sha1 HMAC
algorithm.
hmac-sha1-96 : Force ssh to use hmac-sha1-96 HMAC
algorithm.
hmac-sha2-256 : Force ssh to use hmac-sha2-256
HMAC algorithm.
hmac-sha2-256-96: Force ssh to use hmac-
sha2-256-96 HMAC algorithm.
-p port-
number
(OPTIONAL) Enter the keyword -p then the port number.
The range is from 1 to 65535. The default is
22.
-v {1 | 2} (OPTIONAL) Enter the keyword -v then the SSH version 1 or
2. The default is the version from the protocol negotiation.
Defaults As shown in the Parameters section.
Command
Modes
EXEC Privilege
Command
History
This guide is platform-specific. For command information about other platforms,
refer to the relevant Dell Networking OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command.
Version 9.0.2.0 Introduced on the S6000.
Version
8.3.19.0
Introduced on the S4820T.
Version 8.3.11.1 Introduced on the Z9000.
Version
8.3.12.0
Added support for the -c and -m parameters on the S4810.
Version 8.3.7.0 Introduced on the S4810.
Version 7.6.1.0 Introduced on the S-Series.
Version 7.5.1.0 Added IPv6 support. Introduced on the C-Series.
1422
Security