EasyManua.ls Logo

Dell S4810 - Page 656

Dell S4810
1761 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
-c encryption
cipher
Enter the following encryption cipher to use. (For v2 clients
only.) Without the FIPS mode enabled:
3des-cbc: Force ssh to use 3des-cbc encryption cipher.
With the FIPS mode enabled:
aes128–cbc: Force ssh to use the aes128–cbc
encryption cipher.
aes256–cbc: Force ssh to use the aes256–cbc
encryption cipher.
-l username (OPTIONAL) Enter the keyword —l then the user name used
in this SSH session. The default is the user name of the user
associated with the terminal.
-m HMAC
algorithm
Enter one of the following HMAC algorithms to use. (For v2
clients only.):
Without the FIPS mode enabled:
hmac-sha1: Force ssh to use the hmac-sha1 HMAC
algorithm.
hmac-shal-96: Force ssh to use the hmac-sha1–96
HMAC algorithm.
hmac-md5: Force ssh to use the hmac-md5 HMAC
algorithm.
hmac-md5–96: Force ssh to use the hmac-md5–96
HMAC algorithm.
With the FIPS mode enabled:
hmac-sha1: Force ssh to use the hmac-sha1 HMAC
algorithm.
hmac-sha1–96: Force ssh to use the hmac-sha1–96
HMAC algorithm.
-p port-
number
(OPTIONAL) Enter the keyword —p then the port number.
The range is 1 to 65536
The default is 22
-v {1|2} (OPTIONAL) Enter the keyword —v then the SSH version 1 or
2.
The default: The version from the protocol negotiation.
NOTE: If the FIPS mode is enabled, this option does not
display in the output.
Defaults As indicated above.
656
FIPS Cryptography

Table of Contents

Other manuals for Dell S4810

Related product manuals