Dell Z9500 Command Reference Manual page 760

Hide thumbs Also See for Z9500:
Table of Contents

Advertisement

-c encryption
cipher
-l username
-m HMAC
algorithm
-p port-
number
-v {1|2}
760
NOTE: The :: notation specifies successive hexadecimal
fields of zeros.
Enter the following encryption cipher to use. (For v2 clients
only.) Without the FIPS mode enabled:
3des-cbc: Force ssh to use 3des-cbc encryption cipher.
With the FIPS mode enabled:
aes128–cbc: Force ssh to use the aes128–cbc
encryption cipher.
aes256–cbc: Force ssh to use the aes256–cbc
encryption cipher.
(OPTIONAL) Enter the keyword —l then the user name used
in this SSH session. The default is the user name of the user
associated with the terminal.
Enter one of the following HMAC algorithms to use. (For v2
clients only.):
Without the FIPS mode enabled:
hmac-sha1: Force ssh to use the hmac-sha1 HMAC
algorithm.
hmac-shal-96: Force ssh to use the hmac-sha1–96
HMAC algorithm.
hmac-md5: Force ssh to use the hmac-md5 HMAC
algorithm.
hmac-md5–96: Force ssh to use the hmac-md5–96
HMAC algorithm.
With the FIPS mode enabled:
hmac-sha1: Force ssh to use the hmac-sha1 HMAC
algorithm.
hmac-sha1–96: Force ssh to use the hmac-sha1–96
HMAC algorithm.
(OPTIONAL) Enter the keyword —p then the port number.
The range is 1 to 65536
The default is 22
(OPTIONAL) Enter the keyword —v then the SSH version 1 or
2.
The default: The version from the protocol negotiation.
NOTE: If the FIPS mode is enabled, this option does not
display in the output.
FIPS Cryptography

Advertisement

Table of Contents
loading

Table of Contents