Dell 9.8(0.0) Network Router User Manual


  Open as PDF
of 1910
 
ssh
Open an SSH connection specifying the hostname, username, port number, and version of the SSH
client.
Syntax ssh {hostname|ipv4 address|ipv6 address} [-c encryption
cipher|
-l username|-m HMAC alogorithm|-p port-number|-v {1|2}]
Parameters
hostname (OPTIONAL) Enter the IP address or the hostname of the
remote device.
ipv4 address (OPTIONAL) Enter the IP address in dotted decimal format
A.B.C.D.
ipv6
addressprefix
(OPTIONAL) Enter the IPv6 address in the x:x:x:x::x format
then the prefix length in the /x format. The range is from /0
to /128
NOTE: The :: notation specifies successive hexadecimal
fields of zeros.
-c encryption
cipher
Enter the following encryption cipher to use. (For v2 clients
only.)
3des-cbc: Force ssh to use 3des-cbc encryption cipher.
FIPS mode is enabled or disabled:
3des-cbc: Force ssh to use 3des-cbc encryption cipher.
aes128–cbc: Force ssh to use the aes128–cbc
encryption cipher.
aes192–cbc: Force ssh to use the aes256–cbc
encryption cipher.
aes256–cbc: Force ssh to use the aes128–cbc
encryption cipher.
aes128–ctr: Force ssh to use the aes256–cbc
encryption cipher.
aes192–ctr: Force ssh to use the aes128–cbc
encryption cipher.
aes256–cbc: Force ssh to use the aes256–cbc
encryption cipher.
-l username (OPTIONAL) Enter the keyword —l then the user name used
in this SSH session. The default is the user name of the user
associated with the terminal.
-m HMAC
algorithm
Enter one of the following HMAC algorithms to use. (For v2
clients only.):
698
FIPS Cryptography