Administrator Guide

Table Of Contents
aes256-cbc : Force ssh to use aes256-cbc encryption cipher
aes128-ctr : Force ssh to use aes128-ctr encryption cipher
aes192-ctr : Force ssh to use aes192-ctr encryption cipher
aes256-ctr : Force ssh to use aes256-ctr encryption cipher
-l
username
(OPTIONAL) Enter the keyword -l then the user name used in this SSH session.
The default is the user name of the user associated with the terminal.
-m
HMAC
algorithm
Enter one of the following HMAC algorithms to use. (For v2 clients only):
"no fips mode enable"(disable) will support v1 & v2 client.
hmac-md5: Force ssh to use hmac-md5 HMAC algorithm.
hmac-md5-96: Force ssh to use hmac-md5-96 HMAC algorithm.
hmac-sha1: Force ssh to use hmac-sha1 HMAC algorithm.
hmac-sha1-96 : Force ssh to use hmac-sha1-96 HMAC algorithm.
hmac-sha2-256 : Force ssh to use hmac-sha2-256 HMAC algorithm.
hmac-sha2-256-96: Force ssh to use hmac-sha2-256-96 HMAC algorithm.
-p
port-number
(OPTIONAL) Enter the keyword -p then the port number. The range is from 1 to
65535. The default is 22.
-v {1 | 2} (OPTIONAL) Enter the keyword -v then the SSH version 1 or 2. The default is the
version from the protocol negotiation.
Defaults As shown in the Parameters section.
Command Modes EXEC Privilege
Command
History
This guide is platform-specific. For command information about other platforms, refer to the relevant Dell
Networking OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command.
9.0.2.0 Introduced on the S6000.
8.3.19.0 Introduced on the S4820T.
8.3.11.1 Introduced on the Z9000.
8.3.12.0 Added support for the -c and -m parameters on the S4810.
8.3.7.0 Introduced on the S4810.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Added IPv6 support. Introduced on the C-Series.
pre-6.1.1.0 Introduced on the E-Series.
Usage
Information
Dell Networking OS supports both inbound and outbound SSH sessions using IPv4 or IPv6 addressing.
Inbound SSH supports accessing the system through the management interface as well as through a
physical Layer 3 interface.
Example
Dell#ssh 10.16.151.48 -l anvltest
Trying 10.16.151.48...
01:18:16: %STKUNIT0-M:CP %SEC-5-SSH_USAGE: Initiated SSH Client v2 (FIPS
Disabled) to anvltest@10.16.151.48 by default from console
anvltest@10.16.151.48's password:
Last login: Thu Jan 5 00:17:47 2012 from login-maa-101
[anvltest@dt-maa-linux-1 ~]# exit
logout
Dell#
1152 Security