Dell MXL 10GbE Reference Manual page 514

Switch i/o module
Table of Contents

Advertisement

-p port-
number
-v {1|2}
Defaults
As indicated above.
Command
EXEC Privilege
Modes
Command
Version 9.2(0.0)
History
Example
If FIPS mode is not enabled:
Dell#ssh 10.11.8.12 ?
-c
-l
-m
-p
-v
<cr>
Dell#ssh 10.11.8.12 -c ?
3des-cbc
Dell#ssh 10.11.8.12 -m ?
hmac-sha1
hmac-sha1-96
hmac-md5
hmac-md5-96
With FIPS mode enabled:
Dell#ssh 10.11.8.12 ?
-c
-l
-m
-p
<cr>
Dell#ssh 10.11.8.12 -c ?
aes128-cbc
aes256-cbc
Dell#ssh 10.11.8.12 -m ?
hmac-sha1
hmac-sha1-96
514
hmac-sha1–96: Force ssh to use the hmac-sha1–96
HMAC algorithm.
(OPTIONAL) Enter the keyword —p then the port number.
The range is 1 to 65536
The default is 22
(OPTIONAL) Enter the keyword —v then the SSH version 1 or
2.
The default: The version from the protocol negotiation.
NOTE: If the FIPS mode is enabled, this option does not
display in the output.
Introduced on the MXL 10/40GbE Switch IO Module.
Encryption cipher to use (for v2 client
User name option
HMAC algorithm to use (for v2 clients only)
SSH server port option (default 22)
SSH protocol version
Force ssh to use 3des-cbc encryption cipher
Force ssh to use hmac-sha1 HMAC algorithm
Force ssh to use hmac-sha1-96 HMAC algorithm
Force ssh to use hmac-md5 HMAC algorithm
Force ssh to use hmac-md5-96 HMAC algorithm
Encryption cipher to use (for v2 client
User name option
HMAC algorithm to use (for v2 clients only)
SSH server port option (default 22)
Force ssh to use aes128-cbc encryption cipher
Force ssh to use aes256-cbc encryption cipher
Force ssh to use hmac-sha1 HMAC algorithm
Force ssh to use hmac-sha1-96 HMAC algorithm
FIPS Cryptography

Advertisement

Table of Contents
loading

This manual is also suitable for:

Mxl 40gbe

Table of Contents