Reference Guide
NOTE: Some of the parameters in this command require licensing to access. For more
information, contact your Dell Networking representative.
Example
If FIPS mode is not enabled:
FTOS #ssh 10.11.8.12 ?
-c Encryption cipher to use (for v2 client
-l User name option
-m HMAC algorithm to use (for v2 clients only)
-p SSH server port option (default 22)
-v SSH protocol version
<cr>
FTOS#ssh 10.11.8.12 -c ?
3des-cbc Force ssh to use 3des-cbc encryption cipher
FTOS #ssh 10.11.8.12 -m ?
hmac-sha1 Force ssh to use hmac-sha1 HMAC algorithm
hmac-sha1-96 Force ssh to use hmac-sha1-96 HMAC algorithm
hmac-md5 Force ssh to use hmac-md5 HMAC algorithm
hmac-md5-96 Force ssh to use hmac-md5-96 HMAC algorithm
With FIPS mode enabled:
FTOS #ssh 10.11.8.12 ?
-c Encryption cipher to use (for v2 client
-l User name option
-m HMAC algorithm to use (for v2 clients only)
-p SSH server port option (default 22)
<cr>
FTOS#ssh 10.11.8.12 -c ?
aes128-cbc Force ssh to use aes128-cbc encryption cipher
aes256-cbc Force ssh to use aes256-cbc encryption cipher
FTOS #ssh 10.11.8.12 -m ?
hmac-sha1 Force ssh to use hmac-sha1 HMAC algorithm
hmac-sha1-96 Force ssh to use hmac-sha1-96 HMAC algorithm
441