Users Guide
NOTE: The :: notation species successive hexadecimal elds of zeros.
-c encryption cipher Enable the “FIPS mode enable", this mode will support only v2 client.
"no ps mode enable"(disable) will support v1 & v2 client. This comment is
applicable for both ciphers & HMAC algorithms:
• 3des-cbc: Force ssh to use 3des-cbc encryption cipher.
•
aes128-cbc : Force ssh to use aes128-cbc encryption cipher
• aes192-cbc : Force ssh to use aes192-cbc encryption cipher
• aes256-cbc : Force ssh to use aes256-cbc encryption cipher
• aes128-ctr : Force ssh to use aes128-ctr encryption cipher
• aes192-ctr : Force ssh to use aes192-ctr encryption cipher
• aes256-ctr : Force ssh to use aes256-ctr encryption cipher
-l username (OPTIONAL) Enter the keyword -l then the user name used in this SSH session.
The default is the user name of the user associated with the terminal.
-m HMAC
algorithm
Enter one of the following HMAC algorithms to use. (For v2 clients only):
"no ps mode enable"(disable) will support v1 & v2 client.
• hmac-md5: Force ssh to use hmac-md5 HMAC algorithm.
• hmac-md5-96: Force ssh to use hmac-md5-96 HMAC algorithm.
• hmac-sha1: Force ssh to use hmac-sha1 HMAC algorithm.
• hmac-sha1-96 : Force ssh to use hmac-sha1-96 HMAC algorithm.
• hmac-sha2-256 : Force ssh to use hmac-sha2-256 HMAC algorithm.
• hmac-sha2-256-96: Force ssh to use hmac-sha2-256-96 HMAC algorithm.
-p port-number (OPTIONAL) Enter the keyword -p then the port number. The range is from 1 to
65535. The default is 22.
-v {1 | 2} (OPTIONAL) Enter the keyword -v then the SSH version 1 or 2. The default is the
version from the protocol negotiation.
Defaults As shown in the Parameters section.
Command Modes EXEC Privilege
Command History
This guide is platform-specic. For command information about other platforms, refer to the relevant Dell
Networking OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command.
Version Description
9.7(0.0) Introduced on the S6000–ON.
9.4.(0.0) Added support for VRF.
9.0.2.0 Introduced on the S6000.
8.3.19.0 Introduced on the S4820T.
8.3.11.1 Introduced on the Z9000.
1588
Security










