Service Manual

Table Of Contents
Without the FIPS mode enabled:
hmac-shal-96: Force ssh to use the hmac-sha1–96
HMAC algorithm.
hmac-sha1: Force ssh to use the hmac-sha1 HMAC
algorithm.
hmac-md5–96: Force ssh to use the hmac-md5–96 HMAC
algorithm.
hmac-md5: Force ssh to use the hmac-md5 HMAC
algorithm.
With the FIPS mode enabled:
hmac-sha2-256: Force ssh to use the hmac-sha2-256
HMAC algorithm.
hmac-shal-96: Force ssh to use the hmac-sha1–96
HMAC algorithm.
hmac-sha1: Force ssh to use the hmac-sha1 HMAC
algorithm.
hmac-md5–96: Force ssh to use the hmac-md5–96 HMAC
algorithm.
hmac-md5: Force ssh to use the hmac-md5 HMAC
algorithm.
-p port-number (OPTIONAL) Enter the keyword —p then the port number.
The range is 1 to 65535.
-v {1|2} (OPTIONAL) Enter the keyword —v then the SSH version 1 or 2.
The default: The version from the protocol negotiation.
NOTE: If the FIPS mode is enabled, this option does not
display in the output.
Defaults See Parameters.
Command Modes EXEC Privilege
Command History
This guide is platform-specific. For command information about other platforms, see
the relevant Dell Networking OS Command Line Reference Guide.
Version Description
9.10(0.0) Removed the support for hmac-sha2-256-96 algorithm.
9.8(0.0P5) Introduced on the S4048-ON.
9.8(0.0P2) Introduced on the S3048-ON.
9.5(0.1) Introduced on the Z9500.
9.1(0.0) Introduced on the Z9000.
8.3.19.0 Introduced on the S4820T.
FIPS Cryptography 741