Users Guide
cbc,aes128-ctr,aes192-ctr,aes256-ctr.
SSH server macs : hmac-md5,hmac-md5-96,hmac-sha1,hmac-
sha1-96,hmac-sha2-256.
SSH server kex algorithms : diffie-hellman-group-exchange-
sha1,diffie-hellman-group1-sha1,diffie-hellman-group14-sha1.
Password Authentication : enabled.
Hostbased Authentication : disabled.
RSA Authentication : disabled.
Vty Encryption HMAC Remote IP
0 3des-cbc hmac-sha1-96 10.1.20.48
1 3des-cbc hmac-sha1-96 10.1.20.48
ssh
Open an SSH connection specifying the hostname, username, port number, and version of the SSH client.
Syntax ssh {hostname|ipv4 address|ipv6 address} [-c encryption cipher|-l
username|-m HMAC alogorithm|-p port-number|-v {1|2}]
Parameters
hostname (OPTIONAL) Enter the IP address or the hostname of the remote
device.
ipv4 address (OPTIONAL) Enter the IP address in dotted decimal format
A.B.C.D.
ipv6 addressprefix (OPTIONAL) Enter the IPv6 address in the x:x:x:x::x format then
the prefix length in the /x format. The range is from /0 to /128
NOTE: The :: notation specifies successive hexadecimal
fields of zeros.
-c encryption
cipher
Enter the following encryption cipher to use. (For v2 clients
only.)
• 3des-cbc: Force ssh to use 3des-cbc encryption cipher.
FIPS mode is enabled or disabled:
• aes256–ctr: Force ssh to use the aes256–ctr encryption
cipher.
• aes256–cbc: Force ssh to use the aes128–cbc encryption
cipher.
• aes192–ctr: Force ssh to use the aes128–cbc encryption
cipher.
• aes192–cbc: Force ssh to use the aes256–cbc encryption
cipher.
• aes128–ctr: Force ssh to use the aes256–cbc encryption
cipher.
• aes128–cbc: Force ssh to use the aes128–cbc encryption
cipher.
FIPS Cryptography 752