Administrator Guide
User name to login remote host: admin
Password to login remote host:
Secure Shell Authentication
Secure Shell (SSH) is enabled by default using the SSH Password Authentication method.
Conguring the HMAC Algorithm for the SSH Client
To congure the HMAC algorithm for the SSH client, use the ip ssh mac hmac-algorithm command in CONFIGURATION mode.
hmac-algorithm: Enter a space-delimited list of keyed-hash message authentication code (HMAC) algorithms supported by the SSH
server.
The following HMAC algorithms are available:
• hmac-md5
• hmac-md5-96
• hmac-sha1
• hmac-sha1-96
• hmac-sha2-256
The default list of HMAC algorithm is in the following order:
• hmac-sha2-256
• hmac-sha1
• hmac-sha1-96
• hmac-md5
• hmac-md5-96
When FIPS is enabled, the default HMAC algorithm is hmac-sha2-256, hmac-sha1, hmac-sha1-96.
Example of Conguring a HMAC Algorithm
The following example shows you how to congure a HMAC algorithm list.
Dell(conf)# ip ssh mac hmac-sha1-96
Conguring the SSH Client Cipher List
To congure the cipher list supported by the SSH client, use the ip ssh cipher cipher-list command in CONFIGURATION mode.
cipher-list-: Enter a space-delimited list of ciphers the SSH Client supports.
The following ciphers are available.
• 3des-cbc
• aes128-cbc
• aes192-cbc
• aes256-cbc
Security
709