EasyManua.ls Logo

Dell Force10 Z9000 - Page 623

Dell Force10 Z9000
1483 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Example
If FIPS mode is not enabled:
FTOS #ssh 10.11.8.12 ?
-c Encryption cipher to use (for v2 client
-l User name option
-m HMAC algorithm to use (for v2 clients only)
-p SSH server port option (default 22)
-v SSH protocol version
<cr>
FTOS#ssh 10.11.8.12 -c ?
3des-cbc Force ssh to use 3des-cbc encryption cipher
FTOS #ssh 10.11.8.12 -m ?
hmac-sha1 Force ssh to use hmac-sha1 HMAC algorithm
hmac-sha1-96 Force ssh to use hmac-sha1-96 HMAC algorithm
hmac-md5 Force ssh to use hmac-md5 HMAC algorithm
hmac-md5-96 Force ssh to use hmac-md5-96 HMAC algorithm
With FIPS mode enabled:
FTOS #ssh 10.11.8.12 ?
-c Encryption cipher to use (for v2 client
-l User name option
-m HMAC algorithm to use (for v2 clients only)
-p SSH server port option (default 22)
<cr>
FTOS#ssh 10.11.8.12 -c ?
aes128-cbc Force ssh to use aes128-cbc encryption cipher
aes256-cbc Force ssh to use aes256-cbc encryption cipher
FTOS #ssh 10.11.8.12 -m ?
hmac-sha1 Force ssh to use hmac-sha1 HMAC algorithm
hmac-sha1-96 Force ssh to use hmac-sha1-96 HMAC algorithm
623

Table of Contents

Other manuals for Dell Force10 Z9000

Related product manuals