Dell S4810 Reference Manual page 1520

Hide thumbs Also See for S4810:
Table of Contents

Advertisement

-l username
-m HMAC
algorithm
-p port-
number
-v {1 | 2}
Defaults
As shown in the Parameters section.
Command
EXEC Privilege
Modes
Command
This guide is platform-specific. For command information about other platforms,
History
refer to the relevant Dell Networking OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command.
Version 9.4.
(0.0)
1520
aes192-cbc : Force ssh to use aes192-cbc encryption
cipher
aes256-cbc : Force ssh to use aes256-cbc encryption
cipher
aes128-ctr : Force ssh to use aes128-ctr encryption
cipher
aes192-ctr : Force ssh to use aes192-ctr encryption
cipher
aes256-ctr : Force ssh to use aes256-ctr encryption
cipher
(OPTIONAL) Enter the keyword -l then the user name used
in this SSH session. The default is the user name of the user
associated with the terminal.
Enter one of the following HMAC algorithms to use. (For v2
clients only):
"no fips mode enable"(disable) will support v1 & v2 client.
hmac-md5: Force ssh to use hmac-md5 HMAC algorithm.
hmac-md5-96: Force ssh to use hmac-md5-96 HMAC
algorithm.
hmac-sha1: Force ssh to use hmac-sha1 HMAC
algorithm.
hmac-sha1-96 : Force ssh to use hmac-sha1-96 HMAC
algorithm.
hmac-sha2-256 : Force ssh to use hmac-sha2-256
HMAC algorithm.
hmac-sha2-256-96: Force ssh to use hmac-
sha2-256-96 HMAC algorithm.
(OPTIONAL) Enter the keyword -p then the port number.
The range is from 1 to 65535. The default is 22.
(OPTIONAL) Enter the keyword -v then the SSH version 1 or
2. The default is the version from the protocol negotiation.
Added support for VRF.
Security

Advertisement

Table of Contents
loading

Table of Contents