DELL 9.8(0.0) User Manual

Page of 1910
ssh
Open an SSH connection specifying the hostname, username, port number, and version of the SSH 
client.
Syntax
ssh {hostname|ipv4 address|ipv6 address} [-c encryption 
cipher|-l username|-m HMAC alogorithm|-p port-number|-v {1|2}]
Parameters
hostname
(OPTIONAL) Enter the IP address or the hostname of the 
remote device.
ipv4 address
(OPTIONAL) Enter the IP address in dotted decimal format 
A.B.C.D.
ipv6 
addressprefix
(OPTIONAL) Enter the IPv6 address in the x:x:x:x::x format 
then the prefix length in the /x format. The range is from /0 
to /128
NOTE: The :: notation specifies successive hexadecimal 
fields of zeros.
-c encryption 
cipher
Enter the following encryption cipher to use. (For v2 clients 
only.)
• 3des-cbc: Force ssh to use 3des-cbc encryption cipher.
FIPS mode is enabled or disabled:
• 3des-cbc: Force ssh to use 3des-cbc encryption cipher.
• aes128–cbc: Force ssh to use the aes128–cbc 
encryption cipher.
• aes192–cbc: Force ssh to use the aes256–cbc 
encryption cipher.
• aes256–cbc: Force ssh to use the aes128–cbc 
encryption cipher.
• aes128–ctr: Force ssh to use the aes256–cbc 
encryption cipher.
• aes192–ctr: Force ssh to use the aes128–cbc 
encryption cipher.
• aes256–cbc: Force ssh to use the aes256–cbc 
encryption cipher.
-l username
(OPTIONAL) Enter the keyword —l then the user name used 
in this SSH session. The default is the user name of the user 
associated with the terminal.
-m HMAC 
algorithm
Enter one of the following HMAC algorithms to use. (For v2 
clients only.):
698
FIPS Cryptography