
•
hmac-sha1–96
: Force ssh to use the hmac-sha1–96
HMAC algorithm.
-p port-
number
(OPTIONAL) Enter the keyword
—p
then the port number.
The range is 1 to 65536
The default is 22
-v {1|2}
(OPTIONAL) Enter the keyword
—v
then the SSH version 1 or
2.
The default: The version from the protocol negotiation.
NOTE: If the FIPS mode is enabled, this option does not
display in the output.
Defaults
As indicated above.
Command
Modes
EXEC Privilege
Command
History
Version 9.2(0.0)
Introduced on the MXL 10/40GbE Switch IO Module.
Example
If FIPS mode is not enabled:
Dell#ssh 10.11.8.12 ?
-c Encryption cipher to use (for v2 client
-l User name option
-m HMAC algorithm to use (for v2 clients only)
-p SSH server port option (default 22)
-v SSH protocol version
<cr>
Dell#ssh 10.11.8.12 -c ?
3des-cbc Force ssh to use 3des-cbc encryption cipher
Dell#ssh 10.11.8.12 -m ?
hmac-sha1 Force ssh to use hmac-sha1 HMAC algorithm
hmac-sha1-96 Force ssh to use hmac-sha1-96 HMAC algorithm
hmac-md5 Force ssh to use hmac-md5 HMAC algorithm
hmac-md5-96 Force ssh to use hmac-md5-96 HMAC algorithm
With FIPS mode enabled:
Dell#ssh 10.11.8.12 ?
-c Encryption cipher to use (for v2 client
-l User name option
-m HMAC algorithm to use (for v2 clients only)
-p SSH server port option (default 22)
<cr>
Dell#ssh 10.11.8.12 -c ?
aes128-cbc Force ssh to use aes128-cbc encryption cipher
aes256-cbc Force ssh to use aes256-cbc encryption cipher
Dell#ssh 10.11.8.12 -m ?
hmac-sha1 Force ssh to use hmac-sha1 HMAC algorithm
hmac-sha1-96 Force ssh to use hmac-sha1-96 HMAC algorithm
514
FIPS Cryptography