"no fips mode enable"(disable) will support v1 & v2 client. This
comment is applicable for both ciphers & HMAC algorithms:
•
3des-cbc
•
aes128-cbc
•
aes192-cbc
•
aes256-cbc
•
aes128-ctr
•
aes192-ctr
•
aes256-ctr
-l
username
(OPTIONAL) Enter the keyword
-l
then the user name used in
this SSH session. The default is the user name of the user
associated with the terminal.
-m
HMAC
algorithm
Enter one of the following HMAC algorithms to use. (For v2
clients only):
"no fips mode enable"(disable) will support v1 & v2 client.
•
hmac-sha1
: Force ssh to use hmac-sha1 HMAC algorithm.
•
hmac-sha1-96
: Force ssh to use hmac-sha1-96 HMAC
algorithm.
•
hmac-md5
: Force ssh to use hmac-md5 HMAC algorithm.
•
hmac-md5-96
: Force ssh to use hmac-md5-96 HMAC
algorithm.
•
hmac-sha2-256
: Force ssh to use hmac-sha2-256
HMAC algorithm.
-p
port-number
(OPTIONAL) Enter the keyword
-p
then the port number. The
range is from 1 to 65535. The default is
22
.
-v {1 | 2}
(OPTIONAL) Enter the keyword
-v
then the SSH version 1 or 2.
The default is the version from the protocol negotiation.
Defaults
As shown in the
Parameters
section.
Command Modes
EXEC Privilege
Command History This guide is platform-specific. For command information about other platforms, refer
to the relevant
Dell Networking OS Command Line Reference Guide
.
The following is a list of the Dell Networking OS version history for this command.
Version
Description
9.10(0.0)
Removed the support for
hmac-sha2-256-96
algorithm.
9.9(0.0)
Introduced on the C9010.
9.5(0.1)
Added support for the following ciphers and HMAC alogorithms
on the Z9000, S6000, S4820T, S4820T.
Security
2006
Summary of Contents for C9000 series
Page 1: ...Dell Networking Command Line Reference Guide for the C9000 Series Version 9 10 0 0 ...
Page 394: ...deny 14551 666 Dell Access Control Lists ACL 394 ...
Page 877: ...algorithm FIPS Cryptography 877 ...
Page 1297: ...Total 5 0 Total 5 active route s using 952 bytes IPv6 Basics 1297 ...