Users Guide
• aes128–ctr: Force ssh to use the aes256–cbc encryption cipher.
• aes192–ctr: Force ssh to use the aes128–cbc encryption cipher.
• aes256–cbc: Force ssh to use the aes256–cbc encryption cipher.
-l username (OPTIONAL) Enter the keyword —l then the user name used in this SSH session. 
The default is the user name of the user associated with the terminal.
-m HMAC algorithm Enter one of the following HMAC algorithms to use. (For v2 clients only.):
Without the FIPS mode enabled:
• hmac-sha1: Force ssh to use the hmac-sha1 HMAC algorithm.
• hmac-shal-96: Force ssh to use the hmac-sha1–96 HMAC algorithm.
• hmac-md5: Force ssh to use the hmac-md5 HMAC algorithm.
• hmac-md5–96: Force ssh to use the hmac-md5–96 HMAC algorithm.
With the FIPS mode enabled:
• hmac-md5: Force ssh to use the hmac-md5 HMAC algorithm.
• hmac-md5–96: Force ssh to use the hmac-md5–96 HMAC algorithm.
• hmac-sha1: Force ssh to use the hmac-sha1 HMAC algorithm.
• hmac-shal-96: Force ssh to use the hmac-sha1–96 HMAC algorithm.
• hmac-sha2-256: Force ssh to use the hmac-sha2-256 HMAC algorithm.
• hmac-sha2-256-96: Force ssh to use the hmac-sha2-256-96 HMAC 
algorithm.
-p port-number (OPTIONAL) Enter the keyword —p then the port number.
The range is 1 to 65535.
-v {1|2} (OPTIONAL) Enter the keyword —v then the SSH version 1 or 2.
The default: The version from the protocol negotiation.
NOTE: If the FIPS mode is enabled, this option does not display in the 
output.
Defaults As indicated above.
Command Modes EXEC Privilege
Command History
This guide is platform-specic. For command information about other platforms, refer to the relevant Dell 
Networking OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command.
Version Description
9.1(0.0) Introduced on the Z9000.
8.3.19.0 Introduced on the S4820T.
8.3.12.0 Introduced on the S4810.
Related Commands
ip ssh server Congure an SSH server.
FIPS Cryptography
583










