-c
encryption
cipher
Enter the following encryption cipher. (For v2 clients only.):
• 3des-cbc: Force ssh to use 3des-cbc encryption cipher.
-l
username
(OPTIONAL) Enter the keyword -l followed by the user name used in
this SSH session. The default is the user name of the user associated
with the terminal.
-m
HMAC
algorithm
Enter one of the following HMAC algorithms to use. (For v2 clients
only.):
• hmac-sha1: Force ssh to use the hmac-sha1 HMAC
algorithm.
• hmac-sha1-96: Force ssh to use the hmac-sha1-96 HMAC
algorithm.
• hmac-md5: Force ssh to use the hmac-md5 HMAC
algorithm.
• hmac-md5-96: Force ssh to use the hmac-md5-96 HMAC
algorithm.
-p
port-number
(OPTIONAL) Enter the keyword -p followed by the port number. The
range is 1 to 65536. The default is 22.
-v {1 | 2} (OPTIONAL) Enter the keyword -v followed by the SSH version 1 or 2.
The default is the version from the protocol negotiation.
Defaults As above.
Command Modes EXEC Privilege
Command History
Version 8.3.11.1 Introduced on the Z9000.
Version 8.3.12.0 Added support for the -c and -m parameters on the S4810.
Version 8.3.7.0 Introduced on the S4810.
Version 7.6.1.0 Introduced on the S-Series.
Version 7.5.1.0 Added IPv6 support. Introduced on the C-Series.
pre-Version
6.1.1.0
Introduced on the E-Series.
Usage
Information
FTOS supports both inbound and outbound SSH sessions using IPv4 or IPv6 addressing.
Inbound SSH supports accessing the system through the management interface as well as
through a physical Layer 3 interface.
Example
FTOS#ssh 10.11.8.12 ?
-c Encryption cipher to use (for v2 clients only)
-l User name option
-m HMAC algorithm to use (for v2 clients only)
-p SSH server port option (default 22)
-v SSH protocol version
<cr>
FTOS#ssh 10.11.8.12 -c ?
3des-cbc Force ssh to use 3des-cbc encryption cipher
1337