Users Guide
ssh
Open an SSH connection specifying the hostname, username, port number, and version of the SSH client.
Syntax
ssh {hostname | ipv4 address | ipv6 address} [-c encryption cipher | -l
username | -m HMAC alogorithm | -p port-number | -v {1|2}]
Parameters
hostname (OPTIONAL) Enter the IP address or the hostname of the remote device.
ipv4 address (OPTIONAL) Enter the IP address in dotted decimal format A.B.C.D.
ipv6 address prex-
length
(OPTIONAL) Enter the IPv6 address in the x:x:x:x::x format then the prex length in
the /x format. The range is from /0 to /128
NOTE: The :: notation species successive hexadecimal elds of zeros.
-c encryption cipher Enter the following encryption cipher to use. (For v2 clients only.) Without the FIPS mode
enabled:
• 3des-cbc: Force ssh to use 3des-cbc encryption cipher.
With the FIPS mode enabled:
• aes128–cbc: Force ssh to use the aes128–cbc encryption cipher.
• aes256–cbc: Force ssh to use the aes256–cbc encryption cipher.
-l username (OPTIONAL) Enter the keyword —l then the user name used in this SSH session. The
default is the user name of the user associated with the terminal.
-m HMAC algorithm Enter one of the following HMAC algorithms to use. (For v2 clients only.):
Without the FIPS mode enabled:
• hmac-sha1: Force ssh to use the hmac-sha1 HMAC algorithm.
• hmac-shal-96: Force ssh to use the hmac-sha1–96 HMAC algorithm.
• hmac-md5: Force ssh to use the hmac-md5 HMAC algorithm.
• hmac-md5–96: Force ssh to use the hmac-md5–96 HMAC algorithm.
With the FIPS mode enabled:
• hmac-sha1: Force ssh to use the hmac-sha1 HMAC algorithm.
• hmac-sha1–96: Force ssh to use the hmac-sha1–96 HMAC algorithm.
-p port-number (OPTIONAL) Enter the keyword —p then the port number.
The range is 1 to 65536
The default is 22
-v {1|2} (OPTIONAL) Enter the keyword —v then the SSH version 1 or 2.
The default: The version from the protocol negotiation.
NOTE: If the FIPS mode is enabled, this option does not display in the output.
Defaults As indicated above.
488 FIPS Cryptography