Dell S4810 Reference Manual page 651

Hide thumbs Also See for S4810:
Table of Contents

Advertisement

-p port-
number
-v {1|2}
Defaults
As indicated above.
Command
EXEC Privilege
Modes
Command
This guide is platform-specific. For command information about other platforms,
History
refer to the relevant Dell Networking OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command.
Version 9.1(0.0)
FIPS Cryptography
Without the FIPS mode enabled:
hmac-sha1: Force ssh to use the hmac-sha1 HMAC
algorithm.
hmac-shal-96: Force ssh to use the hmac-sha1–96
HMAC algorithm.
hmac-md5: Force ssh to use the hmac-md5 HMAC
algorithm.
hmac-md5–96: Force ssh to use the hmac-md5–96
HMAC algorithm.
With the FIPS mode enabled:
hmac-md5: Force ssh to use the hmac-md5 HMAC
algorithm.
hmac-md5–96: Force ssh to use the hmac-md5–96
HMAC algorithm.
hmac-sha1: Force ssh to use the hmac-sha1 HMAC
algorithm.
hmac-shal-96: Force ssh to use the hmac-sha1–96
HMAC algorithm.
hmac-sha2-256: Force ssh to use the hmac-sha2-256
HMAC algorithm.
hmac-sha2-256-96: Force ssh to use the hmac-
sha2-256-96 HMAC algorithm.
(OPTIONAL) Enter the keyword —p then the port number.
The range is 1 to 65535.
(OPTIONAL) Enter the keyword —v then the SSH version 1 or
2.
The default: The version from the protocol negotiation.
NOTE: If the FIPS mode is enabled, this option does not
display in the output.
Introduced on the Z9000.
651

Advertisement

Table of Contents
loading

Table of Contents