Service Manual

Table Of Contents
0 3des-cbc hmac-sha1-96 10.1.20.48
1 3des-cbc hmac-sha1-96 10.1.20.48
ssh
Open an SSH connection specifying the hostname, username, port number, and version of the SSH client.
Syntax ssh {hostname|ipv4 address|ipv6 address} [-c encryption cipher|-l
username|-m HMAC alogorithm|-p port-number|-v {1|2}]
Parameters
hostname (OPTIONAL) Enter the IP address or the hostname of the remote
device.
ipv4 address (OPTIONAL) Enter the IP address in dotted decimal format
A.B.C.D.
ipv6 addressprefix (OPTIONAL) Enter the IPv6 address in the x:x:x:x::x format then
the prefix length in the /x format. The range is from /0 to /128
NOTE: The :: notation specifies successive hexadecimal
fields of zeros.
-c encryption
cipher
Enter the following encryption cipher to use. (For v2 clients
only.)
3des-cbc: Force ssh to use 3des-cbc encryption cipher.
FIPS mode is enabled or disabled:
aes256–ctr: Force ssh to use the aes256–ctr encryption
cipher.
aes256–cbc: Force ssh to use the aes128–cbc encryption
cipher.
aes192–ctr: Force ssh to use the aes128–cbc encryption
cipher.
aes192–cbc: Force ssh to use the aes256–cbc encryption
cipher.
aes128–ctr: Force ssh to use the aes256–cbc encryption
cipher.
aes128–cbc: Force ssh to use the aes128–cbc encryption
cipher.
3des-cbc: Force ssh to use 3des-cbc encryption cipher.
-l username (OPTIONAL) Enter the keyword —l then the user name used in
this SSH session. The default is the user name of the user
associated with the terminal.
-m HMAC
algorithm
Enter one of the following HMAC algorithms to use. (For v2
clients only.):
FIPS Cryptography 740