Dell Force10 S4820T FTOS Command Reference Guide - Page 1374
Added IPv6 support; Introduced for C-Series, Introduced for S-Series
View all Dell Force10 S4820T manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 1374 highlights
www.dell.com | support.dell.com Defaults Command Modes Command History Example -m HMAC algorithm -p port-number -v {1 | 2} Enter one of the following HMAC algorithms to use. (For v2 clients only.): • hmac-sha1: Force ssh to use the hmac-sha1 HMAC algorithm. • hmac-sha1-96: Force ssh to use the hmac-sha1-96 HMAC algorithm. • hmac-md5: Force ssh to use the hmac-md5 HMAC algorithm. • hmac-md5-96: Force ssh to use the hmac-md5-96 HMAC algorithm. (OPTIONAL) Enter the keyword -p followed by the port number. Range: 1 to 65536 Default: 22 (OPTIONAL) Enter the keyword -v followed by the SSH version 1 or 2. Default: The version from the protocol negotiation. Note: If FIPS mode is enabled, only version 2 can be selected. As indicated above. EXEC Privilege Version 8.3.19.0 Version 8.3.19.0 Version 8.3.12.0 Version 8.3.7.0 Version 7.9.1.0 Version 7.6.1.0 Version 7.5.1.0 pre-Version 6.1.1.0 Introduced on S4820T Added support for the -c and -m parameters on the S4820T. Added support for the -c and -m parameters on the S4810. Introduced on S4810 Introduced VRF Introduced for S-Series Added IPv6 support; Introduced for C-Series Introduced for E-Series FTOS#ssh 10.11.8.12 ? -c Encryption cipher to use (for v2 clients only) -l User name option -m HMAC algorithm to use (for v2 clients only) -p SSH server port option (default 22) -v SSH protocol version FTOS#ssh 10.11.8.12 -c ? 3des-cbc Force ssh to use 3des-cbc encryption cipher FTOS#ssh 10.11.8.12 -m ? hmac-sha1 Force ssh to use hmac-sha1 HMAC algorithm hmac-sha1-96 Force ssh to use hmac-sha1-96 HMAC algorithm hmac-md5 Force ssh to use hmac-md5 HMAC algorithm hmac-md5-96 Force ssh to use hmac-md5-96 HMAC algorithm 1374 | Security