-p SSH server port option (default 22)
-v SSH protocol version
<cr>
Dell#ssh 10.11.8.12 -c ?
3des-cbc Force ssh to use 3des-cbc encryption
cipher
aes128-cbc Force ssh to use aes128-cbc encryption
cipher
aes192-cbc Force ssh to use aes192-cbc encryption
cipher
aes256-cbc Force ssh to use aes256-cbc encryption
cipher
aes128-ctr Force ssh to use aes128-ctr encryption
cipher
aes192-ctr Force ssh to use aes192-ctr encryption
cipher
aes256-ctr Force ssh to use aes256-ctr encryption
cipher
Dell#ssh 10.11.8.12 -m ?
hmac-md5 Force ssh to use hmac-md5 HMAC algorithm
hmac-md5-96 Force ssh to use hmac-md5-96 HMAC
algorithm
hmac-sha1 Force ssh to use hmac-sha1 HMAC algorithm
hmac-sha1-96 Force ssh to use hmac-sha1-96 HMAC
algorithm
hmac-sha2-256 Force ssh to use hmac-sha2-256 HMAC
algorithm
With FIPS mode enabled:
Dell#ssh 10.11.8.12 ?
-c Encryption cipher to use (for v2 clients
only)
-l User name option
-m HMAC algorithm to use (for v2 clients
only)
-p SSH server port option (default 22)
<cr>
Dell#ssh 10.11.8.12 -c ?
3des-cbc Force ssh to use 3des-cbc encryption
cipher
aes128-cbc Force ssh to use aes128-cbc encryption
cipher
aes192-cbc Force ssh to use aes192-cbc encryption
cipher
aes256-cbc Force ssh to use aes256-cbc encryption
cipher
aes128-ctr Force ssh to use aes128-ctr encryption
cipher
aes192-ctr Force ssh to use aes192-ctr encryption
cipher
aes256-ctr Force ssh to use aes256-ctr encryption
cipher
Dell#ssh 10.11.8.12 -m ?
hmac-sha1 Force ssh to use hmac-sha1 HMAC algorithm
hmac-sha1-96 Force ssh to use hmac-sha1-96 HMAC
algorithm
hmac-sha2-256 Force ssh to use hmac-sha2-256 HMAC
FIPS Cryptography
876
Summary of Contents for C9000 series
Page 1: ...Dell Networking Command Line Reference Guide for the C9000 Series Version 9 10 0 0 ...
Page 394: ...deny 14551 666 Dell Access Control Lists ACL 394 ...
Page 877: ...algorithm FIPS Cryptography 877 ...
Page 1297: ...Total 5 0 Total 5 active route s using 952 bytes IPv6 Basics 1297 ...