Dell S4810 Reference Manual page 656

Hide thumbs Also See for S4810:
Table of Contents

Advertisement

-c encryption
cipher
-l username
-m HMAC
algorithm
-p port-
number
-v {1|2}
Defaults
As indicated above.
656
Enter the following encryption cipher to use. (For v2 clients
only.) Without the FIPS mode enabled:
3des-cbc: Force ssh to use 3des-cbc encryption cipher.
With the FIPS mode enabled:
aes128–cbc: Force ssh to use the aes128–cbc
encryption cipher.
aes256–cbc: Force ssh to use the aes256–cbc
encryption cipher.
(OPTIONAL) Enter the keyword —l then the user name used
in this SSH session. The default is the user name of the user
associated with the terminal.
Enter one of the following HMAC algorithms to use. (For v2
clients only.):
Without the FIPS mode enabled:
hmac-sha1: Force ssh to use the hmac-sha1 HMAC
algorithm.
hmac-shal-96: Force ssh to use the hmac-sha1–96
HMAC algorithm.
hmac-md5: Force ssh to use the hmac-md5 HMAC
algorithm.
hmac-md5–96: Force ssh to use the hmac-md5–96
HMAC algorithm.
With the FIPS mode enabled:
hmac-sha1: Force ssh to use the hmac-sha1 HMAC
algorithm.
hmac-sha1–96: Force ssh to use the hmac-sha1–96
HMAC algorithm.
(OPTIONAL) Enter the keyword —p then the port number.
The range is 1 to 65536
The default is 22
(OPTIONAL) Enter the keyword —v then the SSH version 1 or
2.
The default: The version from the protocol negotiation.
NOTE: If the FIPS mode is enabled, this option does not
display in the output.
FIPS Cryptography

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents