Dell Force10 Z9000 Reference Manual page 1337

Ftos command line reference guide for the z9000 system ftos 9.1.(0.0)
Hide thumbs Also See for Force10 Z9000:
Table of Contents

Advertisement

-c
cipher
-l
-m
algorithm
-p
-v {1 | 2}
Defaults
As above.
Command Modes
EXEC Privilege
Command History
Version 8.3.11.1
Version 8.3.12.0
Version 8.3.7.0
Version 7.6.1.0
Version 7.5.1.0
pre-Version
6.1.1.0
Usage
FTOS supports both inbound and outbound SSH sessions using IPv4 or IPv6 addressing.
Information
Inbound SSH supports accessing the system through the management interface as well as
through a physical Layer 3 interface.
Example
FTOS#ssh 10.11.8.12 ?
-c
-l
-m
-p
-v
<cr>
FTOS#ssh 10.11.8.12 -c ?
3des-cbc
encryption
Enter the following encryption cipher. (For v2 clients only.):
username
(OPTIONAL) Enter the keyword -l followed by the user name used in
this SSH session. The default is the user name of the user associated
with the terminal.
HMAC
Enter one of the following HMAC algorithms to use. (For v2 clients
only.):
port-number
(OPTIONAL) Enter the keyword -p followed by the port number. The
range is 1 to 65536. The default is 22.
(OPTIONAL) Enter the keyword -v followed by the SSH version 1 or 2.
The default is the version from the protocol negotiation.
Introduced on the Z9000.
Added support for the -c and -m parameters on the S4810.
Introduced on the S4810.
Introduced on the S-Series.
Added IPv6 support. Introduced on the C-Series.
Introduced on the E-Series.
Encryption cipher to use (for v2 clients only)
User name option
HMAC algorithm to use (for v2 clients only)
SSH server port option (default 22)
SSH protocol version
Force ssh to use 3des-cbc encryption cipher
3des-cbc: Force ssh to use 3des-cbc encryption cipher.
hmac-sha1: Force ssh to use the hmac-sha1 HMAC
algorithm.
hmac-sha1-96: Force ssh to use the hmac-sha1-96 HMAC
algorithm.
hmac-md5: Force ssh to use the hmac-md5 HMAC
algorithm.
hmac-md5-96: Force ssh to use the hmac-md5-96 HMAC
algorithm.
1337

Advertisement

Table of Contents
loading

Table of Contents