Reference Guide

Note: The :: notation specifies successive hexadecimal fields of
zeros.
-c encryption
cipher
Enter the following encryption cipher to use. (For v2 clients only.)
Without the FIPS mode enabled:
3des-cbc: Force ssh to use 3des-cbc encryption cipher.
With the FIPS mode enabled:
aes128–cbc: Force ssh to use the aes128–cbc encryption
cipher.
aes256–cbc: Force ssh to use the aes256–cbc encryption
cipher.
-l username (OPTIONAL) Enter the keyword —l followed by the user name used in
this SSH session. Default: The user name of the user associated with
the terminal.
-m HMAC
algorithm
Enter one of the following HMAC algorithms to use. (For v2 clients
only.):
Without the FIPS mode enabled:
hmac-sha1: Force ssh to use the hmac-sha1 HMAC algorithm.
hmac-shal-96: Force ssh to use the hmac-sha1–96 HMAC
algorithm.
hmac-md5: Force ssh to use the hmac-md5 HMAC algorithm.
hmac-md5–96: Force ssh to use the hmac-md5–96 HMAC
algorithm.
With the FIPS mode enabled:
hmac-sha1: Force ssh to use the hmac-sha1 HMAC algorithm.
hmac-sha1–96: Force ssh to use the hmac-sha1–96 HMAC
algorithm.
-p port-number (OPTIONAL) Enter the keyword —p followed by the port number.
Range: 1 to 65536
Default: 22
-v {1|2} (OPTIONAL) Enter the keyword —v followed by the SSH version 1 or
2.
Default: The version from the protocol negotiation.
Note: If the FIPS mode is enabled, this option does not display in the
output.
Defaults As indicated above.
Command Modes EXEC Privilege
696