Dell Force10 S4810P Reference Manual page 686

Ftos command line reference guide for the s4810 system ftos 9.1.(0.0)
Hide thumbs Also See for Force10 S4810P:
Table of Contents

Advertisement

-l username
-m HMAC
algorithm
-p port-number
-v {1|2}
Defaults
As indicated above.
Command Modes
EXEC Privilege
Command History
Version 9.1(0.0)
Version 8.3.12.0
Related
ip ssh server
Commands
show ip ssh
client-pub-keys
686
With the FIPS mode enabled:
aes128–cbc: Force ssh to use the aes128–cbc encryption
cipher.
aes256–cbc: Force ssh to use the aes256–cbc encryption
cipher.
(OPTIONAL) Enter the keyword —l followed by the user name used in
this SSH session. Default: The user name of the user associated with
the terminal.
Enter one of the following HMAC algorithms to use. (For v2 clients
only.):
Without the FIPS mode enabled:
hmac-sha1: Force ssh to use the hmac-sha1 HMAC algorithm.
hmac-shal-96: Force ssh to use the hmac-sha1–96 HMAC
algorithm.
hmac-md5: Force ssh to use the hmac-md5 HMAC algorithm.
hmac-md5–96: Force ssh to use the hmac-md5–96 HMAC
algorithm.
With the FIPS mode enabled:
hmac-sha1: Force ssh to use the hmac-sha1 HMAC algorithm.
hmac-sha1–96: Force ssh to use the hmac-sha1–96 HMAC
algorithm.
(OPTIONAL) Enter the keyword —p followed by the port number.
Range: 1 to 65536
Default: 22
(OPTIONAL) Enter the keyword —v followed by the SSH version 1 or
2.
Default: The version from the protocol negotiation.
Note: If the FIPS mode is enabled, this option does not display in the
output.
Introduced on the Z9000.
Introduced on the S4810.
Configure an SSH server.
Display the client-public keys.

Advertisement

Table of Contents
loading

Table of Contents