Dell S4810 Reference Manual page 652

Hide thumbs Also See for S4810:
Table of Contents

Advertisement

Version
8.3.19.0
Version
8.3.12.0
Related
ip ssh server
Commands
show ip ssh
client-pub-
keys
Usage
Dell Networking OS supports both inbound and outbound SSH sessions using IPv4
Information
or IPv6 addressing. Inbound SSH supports accessing the system through the
management interface as well as through a physical Layer 3 interface.
Example
If FIPS mode is not enabled:
Dell#ssh 10.10.10.10 ?
-c
-l
-m
-p
-v
<cr>
Dell#ssh 10.10.10.10 -c ?
3des-cbc
cipher
aes128-cbc
cipher
aes192-cbc
cipher
aes256-cbc
cipher
aes128-ctr
cipher
aes192-ctr
cipher
aes256-ctr
cipher
Dell#ssh 10.10.10.10 -m ?
hmac-md5
hmac-md5-96
hmac-sha1
hmac-sha1-96
hmac-sha2-256
hmac-sha2-256-96
algorithm
With FIPS mode enabled:
Dell#ssh 10.10.10.10 ?
-c
-l
-m
-p
652
Introduced on the S4820T.
Introduced on the S4810.
Configure an SSH server.
Display the client-public keys.
NOTE: Some of the parameters in this command require licensing to access.
For more information, contact your Dell Networking representative.
Encryption cipher to use (for v2 clients only)
User name option
HMAC algorithm to use (for v2 clients only)
SSH server port option (default 22)
SSH protocol version
Force ssh to use hmac-md5 HMAC algorithm
Force ssh to use hmac-md5-96 HMAC algorithm
Force ssh to use hmac-sha1 HMAC algorithm
Force ssh to use hmac-sha1-96 HMAC algorithm
Force ssh to use hmac-sha2-256 HMAC algorithm
Force ssh to use hmac-sha2-256-96 HMAC
Encryption cipher to use (for v2 clients only)
User name option
HMAC algorithm to use (for v2 clients only)
SSH server port option (default 22)
Force ssh to use 3des-cbc encryption
Force ssh to use aes128-cbc encryption
Force ssh to use aes192-cbc encryption
Force ssh to use aes256-cbc encryption
Force ssh to use aes128-ctr encryption
Force ssh to use aes192-ctr encryption
Force ssh to use aes256-ctr encryption
FIPS Cryptography

Advertisement

Table of Contents
loading

Table of Contents