CLI Guide

hmac-shal-96: Force ssh to use the hmac-sha1–96
HMAC algorithm.
hmac-md5: Force ssh to use the hmac-md5 HMAC
algorithm.
hmac-md5–96: Force ssh to use the hmac-md5–96
HMAC algorithm.
With the FIPS mode enabled:
hmac-sha1: Force ssh to use the hmac-sha1 HMAC
algorithm.
hmac-sha1–96: Force ssh to use the hmac-sha1–96
HMAC algorithm.
-p port-number (OPTIONAL) Enter the keyword —p then the port number.
The range is 1 to 65536
The default is 22
-v {1|2} (OPTIONAL) Enter the keyword —v then the SSH version 1 or
2.
The default: The version from the protocol negotiation.
NOTE: If the FIPS mode is enabled, this option does not
display in the output.
Defaults As indicated above.
Command Modes EXEC Privilege
Supported Modes Full–Switch
Command History
Version Description
9.9(0.0) Introduced on the FN IOM.
9.2(0.0) Introduced on the MXL 10/40GbE Switch IO Module.
Example
If FIPS mode is not enabled:
Dell#ssh 10.11.8.12 ?
-c Encryption cipher to use (for v2 client
-l User name option
-m HMAC algorithm to use (for v2 clients only)
-p SSH server port option (default 22)
-v SSH protocol version
<cr>
Dell#ssh 10.11.8.12 -c ?
3des-cbc Force ssh to use 3des-cbc encryption cipher
Dell#ssh 10.11.8.12 -m ?
hmac-sha1 Force ssh to use hmac-sha1 HMAC algorithm
hmac-sha1-96 Force ssh to use hmac-sha1-96 HMAC algorithm
hmac-md5 Force ssh to use hmac-md5 HMAC algorithm
hmac-md5-96 Force ssh to use hmac-md5-96 HMAC algorithm
FIPS Cryptography
565