Administrator Guide

aes128–cbc: Force ssh to use the aes128–cbc encryption cipher.
3des-cbc: Force ssh to use 3des-cbc encryption cipher.
-l username (OPTIONAL) Enter the keyword —l then the user name used in this SSH session. The
default is the user name of the user associated with the terminal.
-m HMAC
algorithm
Enter one of the following HMAC algorithms to use. (For v2 clients only.):
Without the FIPS mode enabled:
hmac-shal-96: Force ssh to use the hmac-sha1–96 HMAC algorithm.
hmac-sha1: Force ssh to use the hmac-sha1 HMAC algorithm.
hmac-md5–96: Force ssh to use the hmac-md5–96 HMAC algorithm.
hmac-md5: Force ssh to use the hmac-md5 HMAC algorithm.
With the FIPS mode enabled:
hmac-sha2-256: Force ssh to use the hmac-sha2-256 HMAC algorithm.
hmac-shal-96: Force ssh to use the hmac-sha1–96 HMAC algorithm.
hmac-sha1: Force ssh to use the hmac-sha1 HMAC algorithm.
hmac-md5–96: Force ssh to use the hmac-md5–96 HMAC algorithm.
hmac-md5: Force ssh to use the hmac-md5 HMAC algorithm.
-p port-number (OPTIONAL) Enter the keyword —p then the port number.
The range is 1 to 65535.
-v 2 (OPTIONAL) Enter the keyword —v then the SSH version 2.
The default: The version from the protocol negotiation.
NOTE: If the FIPS mode is enabled, this option does not display in the
output.
Defaults See Parameters.
Command Modes EXEC Privilege
Command History
This guide is platform-specific. For command information about other platforms, see the relevant Dell EMC
Networking OS Command Line Reference Guide.
Version Description
9.10(0.0) Removed the support for hmac-sha2-256-96 algorithm.
9.8(0.0P5) Introduced on the S4048-ON.
9.8(0.0P2) Introduced on the S3048-ON.
9.5(0.1) Introduced on the Z9500.
9.1(0.0) Introduced on the Z9000.
8.3.19.0 Introduced on the S4820T.
8.3.12.0 Introduced on the S4810.
Related
Commands
ip ssh server Configure an SSH server.
show ip ssh client-
pub-keys
Display the client-public keys.
Usage Information
Dell EMC Networking OS supports both inbound and outbound SSH sessions using IPv4 or IPv6 addressing.
Inbound SSH supports accessing the system through the management interface as well as through a physical
Layer 3 interface.
NOTE: Some of the parameters in this command require licensing to access. For more information,
contact your Dell EMC Networking representative.
594 FIPS Cryptography