Service Manual

Table Of Contents
aes128-cbc : Force ssh to use aes128-cbc encryption
cipher
aes192-cbc : Force ssh to use aes192-cbc encryption
cipher
aes256-cbc : Force ssh to use aes256-cbc encryption
cipher
aes128-ctr : Force ssh to use aes128-ctr encryption
cipher
aes192-ctr : Force ssh to use aes192-ctr encryption
cipher
aes256-ctr : Force ssh to use aes256-ctr encryption
cipher
-l username (OPTIONAL) Enter the keyword -l then the user name used in
this SSH session. The default is the user name of the user
associated with the terminal.
-m HMAC
algorithm
Enter one of the following HMAC algorithms to use. (For v2
clients only):
"no fips mode enable"(disable) will support v1 & v2 client.
hmac-md5: Force ssh to use hmac-md5 HMAC algorithm.
hmac-md5-96: Force ssh to use hmac-md5-96 HMAC
algorithm.
hmac-sha1: Force ssh to use hmac-sha1 HMAC algorithm.
hmac-sha1-96 : Force ssh to use hmac-sha1-96 HMAC
algorithm.
hmac-sha2-256 : Force ssh to use hmac-sha2-256
HMAC algorithm.
-p port-number (OPTIONAL) Enter the keyword -p then the port number. The
range is from 1 to 65535. The default is 22.
-v {1 | 2} (OPTIONAL) Enter the keyword -v then the SSH version 1 or 2.
The default is the version from the protocol negotiation.
Defaults As shown in the Parameters section.
Command Modes EXEC Privilege
Command History
This guide is platform-specific. For command information about other platforms, see
the relevant Dell Networking OS Command Line Reference Guide.
Version Description
9.10(0.0) Removed the support for hmac-sha2-256-96 algorithm.
9.8(1.0) Introduced on the Z9100-ON.
9.8(0.0P5) Introduced on the S4048-ON.
Security 1786