ssh
Open an SSH connection specifying the hostname, username, port number, and version of the SSH
client.
Syntax
ssh {
hostname
|
ipv4 address
|
ipv6 address
} [
-c encryption
cipher
|
-l username
|
-m HMAC alogorithm
|
-p port-number
| -v
{1|2}]
Parameters
hostname
(OPTIONAL) Enter the IP address or the hostname of the
remote device.
ipv4 address
(OPTIONAL) Enter the IP address in dotted decimal format
A.B.C.D.
ipv6 address
prefix-length
(OPTIONAL) Enter the IPv6 address in the x:x:x:x::x format
then the prefix length in the /x format. The range is from /0
to /128
NOTE: The :: notation specifies successive hexadecimal
fields of zeros.
-c encryption
cipher
Enter the following encryption cipher to use. (For v2 clients
only.) Without the FIPS mode enabled:
•
3des-cbc
: Force ssh to use 3des-cbc encryption cipher.
With the FIPS mode enabled:
•
aes128–cbc
: Force ssh to use the aes128–cbc
encryption cipher.
•
aes256–cbc
: Force ssh to use the aes256–cbc
encryption cipher.
-l username
(OPTIONAL) Enter the keyword
—l
then the user name used
in this SSH session. The default is the user name of the user
associated with the terminal.
-m HMAC
algorithm
Enter one of the following HMAC algorithms to use. (For v2
clients only.):
Without the FIPS mode enabled:
•
hmac-sha1
: Force ssh to use the hmac-sha1 HMAC
algorithm.
•
hmac-shal-96
: Force ssh to use the hmac-sha1–96
HMAC algorithm.
•
hmac-md5
: Force ssh to use the hmac-md5 HMAC
algorithm.
•
hmac-md5–96
: Force ssh to use the hmac-md5–96
HMAC algorithm.
With the FIPS mode enabled:
•
hmac-sha1
: Force ssh to use the hmac-sha1 HMAC
algorithm.
FIPS Cryptography
513