Dell C9000 Series Reference Manual page 874

Networking command-line reference guide
Hide thumbs Also See for C9000 Series:
Table of Contents

Advertisement

With the FIPS mode enabled:
-l username
(OPTIONAL) Enter the keyword —l then the user name used in
this SSH session. The default is the user name of the user
associated with the terminal.
-m HMAC
Enter one of the following HMAC algorithms to use. (For v2
algorithm
clients only.):
Without the FIPS mode enabled:
With the FIPS mode enabled:
aes192-cbc : Force ssh to use the aes192-cbc encryption
cipher.
aes128-ctr : Force ssh to use the aes192-ctr encryption
cipher.
aes128-cbc : Force ssh to use the aes192-cbc encryption
cipher.
3des-cbc : Force ssh to use 3des-cbc encryption cipher.
aes256-ctr : Force ssh to use the aes256-ctr encryption
cipher.
aes256-cbc : Force ssh to use the aes256-cbc encryption
cipher.
aes192-ctr : Force ssh to use the aes192-ctr encryption
cipher.
aes192-cbc : Force ssh to use the aes192-cbc encryption
cipher.
aes128-ctr : Force ssh to use the aes192-ctr encryption
cipher.
aes128-cbc : Force ssh to use the aes192-cbc encryption
cipher.
3des-cbc : Force ssh to use 3des-cbc encryption cipher.
hmac-sha2-256 : Force ssh to use the hmac-sha2-256
HMAC algorithm.
hmac-sha1: Force ssh to use the hmac-sha1 HMAC
algorithm.
hmac-shal-96: Force ssh to use the hmac-sha1–96
HMAC algorithm.
hmac-md5: Force ssh to use the hmac-md5 HMAC
algorithm.
hmac-md5–96: Force ssh to use the hmac-md5–96 HMAC
algorithm.
hmac-sha2-256 : Force ssh to use the hmac-sha2-256
HMAC algorithm.
hmac-sha1: Force ssh to use the hmac-sha1 HMAC
algorithm.
hmac-sha1–96: Force ssh to use the hmac-sha1–96
HMAC algorithm.
FIPS Cryptography
874

Advertisement

Table of Contents
loading

Table of Contents