Users Guide
Parameters
hostname (OPTIONAL) Enter the IP address or the hostname of the remote device.
ipv4 address (OPTIONAL) Enter the IP address in dotted decimal format A.B.C.D.
ipv6 addressprex (OPTIONAL) Enter the IPv6 address in the x:x:x:x::x format then the prex length in
the /x format. The range is from /0 to /128
NOTE: The :: notation species successive hexadecimal elds of zeros.
-c encryption cipher Enter the following encryption cipher to use. (For v2 clients only.)
• 3des-cbc: Force ssh to use 3des-cbc encryption cipher.
FIPS mode is enabled or disabled:
• aes256–ctr: Force ssh to use the aes256–ctr encryption cipher.
• aes256–cbc: Force ssh to use the aes128–cbc encryption cipher.
• aes192–ctr: Force ssh to use the aes128–cbc encryption cipher.
• aes192–cbc: Force ssh to use the aes256–cbc encryption cipher.
• aes128–ctr: Force ssh to use the aes256–cbc encryption cipher.
• aes128–cbc: Force ssh to use the aes128–cbc encryption cipher.
• 3des-cbc: Force ssh to use 3des-cbc encryption cipher.
-l username (OPTIONAL) Enter the keyword —l then the user name used in this SSH session. The
default is the user name of the user associated with the terminal.
-m HMAC algorithm Enter one of the following HMAC algorithms to use. (For v2 clients only.):
Without the FIPS mode enabled:
• hmac-shal-96: Force ssh to use the hmac-sha1–96 HMAC algorithm.
• hmac-sha1: Force ssh to use the hmac-sha1 HMAC algorithm.
• hmac-md5–96: Force ssh to use the hmac-md5–96 HMAC algorithm.
• hmac-md5: Force ssh to use the hmac-md5 HMAC algorithm.
With the FIPS mode enabled:
• hmac-sha2-256: Force ssh to use the hmac-sha2-256 HMAC algorithm.
• hmac-shal-96: Force ssh to use the hmac-sha1–96 HMAC algorithm.
• hmac-sha1: Force ssh to use the hmac-sha1 HMAC algorithm.
• hmac-md5–96: Force ssh to use the hmac-md5–96 HMAC algorithm.
• hmac-md5: Force ssh to use the hmac-md5 HMAC algorithm.
-p port-number (OPTIONAL) Enter the keyword —p then the port number.
The range is 1 to 65535.
-v {1|2} (OPTIONAL) Enter the keyword —v then the SSH version 1 or 2.
The default: The version from the protocol negotiation.
NOTE: If the FIPS mode is enabled, this option does not display in the output.
Defaults See Parameters.
Command Modes EXEC Privilege
FIPS Cryptography 687