Command Line Reference Guide

-m
HMAC
algorithm
Enter one of the following HMAC algorithms to use. (For v2 clients
only.):
hmac-sha1: Force ssh to use the hmac-sha1 HMAC
algorithm.
hmac-sha1-96: Force ssh to use the hmac-sha1-96 HMAC
algorithm.
hmac-md5: Force ssh to use the hmac-md5 HMAC
algorithm.
hmac-md5-96: Force ssh to use the hmac-md5-96 HMAC
algorithm.
-p
port-number
(OPTIONAL) Enter the keyword -p followed by the port number. The
range is 1 to 65536. The default is 22.
-v {1 | 2} (OPTIONAL) Enter the keyword -v followed by the SSH version 1 or 2.
The default is the version from the protocol negotiation.
Defaults As above.
Command Modes EXEC Privilege
Command History
Version 9.0(1.3) Introduced on the S5000.
Usage
Information
FTOS supports both inbound and outbound SSH sessions using IPv4 or IPv6 addressing.
Inbound SSH supports accessing the system through the management interface as well as
through a physical Layer 3 interface.
Example
FTOS#ssh 10.11.8.12 ?
-c Encryption cipher to use (for v2 clients only)
-l User name option
-m HMAC algorithm to use (for v2 clients only)
-p SSH server port option (default 22)
-v SSH protocol version
<cr>
FTOS#ssh 10.11.8.12 -c ?
3des-cbc Force ssh to use 3des-cbc encryption cipher
FTOS#ssh 10.11.8.12 -m ?
hmac-sha1 Force ssh to use hmac-sha1 HMAC algorithm
hmac-sha1-96 Force ssh to use hmac-sha1-96 HMAC algorithm
hmac-md5 Force ssh to use hmac-md5 HMAC algorithm
hmac-md5-96 Force ssh to use hmac-md5-96 HMAC algorithm
Secure DHCP Commands
DHCP as defined by RFC 2131 provides no authentication or security mechanisms. Secure DHCP is a suite of features
that protects networks that use dynamic address allocation from spoofing and attacks.
1168