•
aes192-cbc
: Force ssh to use the aes192-cbc encryption
cipher.
•
aes128-ctr
: Force ssh to use the aes192-ctr encryption
cipher.
•
aes128-cbc
: Force ssh to use the aes192-cbc encryption
cipher.
•
3des-cbc
: Force ssh to use 3des-cbc encryption cipher.
With the FIPS mode enabled:
•
aes256-ctr
: Force ssh to use the aes256-ctr encryption
cipher.
•
aes256-cbc
: Force ssh to use the aes256-cbc encryption
cipher.
•
aes192-ctr
: Force ssh to use the aes192-ctr encryption
cipher.
•
aes192-cbc
: Force ssh to use the aes192-cbc encryption
cipher.
•
aes128-ctr
: Force ssh to use the aes192-ctr encryption
cipher.
•
aes128-cbc
: Force ssh to use the aes192-cbc encryption
cipher.
•
3des-cbc
: Force ssh to use 3des-cbc encryption cipher.
-l username
(OPTIONAL) Enter the keyword
—l
then the user name used in
this SSH session. The default is the user name of the user
associated with the terminal.
-m HMAC
algorithm
Enter one of the following HMAC algorithms to use. (For v2
clients only.):
Without the FIPS mode enabled:
•
hmac-sha2-256
: Force ssh to use the hmac-sha2-256
HMAC algorithm.
•
hmac-sha1
: Force ssh to use the hmac-sha1 HMAC
algorithm.
•
hmac-shal-96
: Force ssh to use the hmac-sha1–96
HMAC algorithm.
•
hmac-md5
: Force ssh to use the hmac-md5 HMAC
algorithm.
•
hmac-md5–96
: Force ssh to use the hmac-md5–96 HMAC
algorithm.
With the FIPS mode enabled:
•
hmac-sha2-256
: Force ssh to use the hmac-sha2-256
HMAC algorithm.
•
hmac-sha1
: Force ssh to use the hmac-sha1 HMAC
algorithm.
•
hmac-sha1–96
: Force ssh to use the hmac-sha1–96
HMAC algorithm.
FIPS Cryptography
874
Summary of Contents for C9000 series
Page 1: ...Dell Networking Command Line Reference Guide for the C9000 Series Version 9 10 0 0 ...
Page 394: ...deny 14551 666 Dell Access Control Lists ACL 394 ...
Page 877: ...algorithm FIPS Cryptography 877 ...
Page 1297: ...Total 5 0 Total 5 active route s using 952 bytes IPv6 Basics 1297 ...