EasyManua.ls Logo

Dell Force10 Z9000 - Page 622

Dell Force10 Z9000
1483 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
With the FIPS mode enabled:
aes128–cbc: Force ssh to use the aes128–cbc encryption
cipher.
aes256–cbc: Force ssh to use the aes256–cbc encryption
cipher.
-l username (OPTIONAL) Enter the keyword —l followed by the user name used in
this SSH session. Default: The user name of the user associated with
the terminal.
-m HMAC
algorithm
Enter one of the following HMAC algorithms to use. (For v2 clients
only.):
Without the FIPS mode enabled:
hmac-sha1: Force ssh to use the hmac-sha1 HMAC algorithm.
hmac-shal-96: Force ssh to use the hmac-sha1–96 HMAC
algorithm.
hmac-md5: Force ssh to use the hmac-md5 HMAC algorithm.
hmac-md5–96: Force ssh to use the hmac-md5–96 HMAC
algorithm.
With the FIPS mode enabled:
hmac-sha1: Force ssh to use the hmac-sha1 HMAC algorithm.
hmac-sha1–96: Force ssh to use the hmac-sha1–96 HMAC
algorithm.
-p port-number (OPTIONAL) Enter the keyword —p followed by the port number.
Range: 1 to 65536
Default: 22
-v {1|2} (OPTIONAL) Enter the keyword —v followed by the SSH version 1 or
2.
Default: The version from the protocol negotiation.
Note: If the FIPS mode is enabled, this option does not display in the
output.
Defaults As indicated above.
Command Modes EXEC Privilege
Command History
Version 9.1(0.0) Introduced on the Z9000.
Version 8.3.12.0 Introduced on the S4810.
Related
Commands
ip ssh server Configure an SSH server.
show ip ssh
client-pub-keys
Display the client-public keys.
622

Table of Contents

Other manuals for Dell Force10 Z9000

Related product manuals