Dell 9.8(0.0) Network Router User Manual


  Open as PDF
of 1910
 
Dell#
Related
Commands
ip ssh rsa-authentication (Config) — configures the RSA authorized keys.
ssh
Open an SSH connection specifying the hostname, username, encryption cipher, HMAC algorithm, port
number, and version of the SSH client.
Syntax
NOTE: Some of the parameters in this command require licensing to access.
For more information, contact your Dell Networking representative.
ssh [vrf vrf-name] {hostname | ipv4 address | ipv6 address} [-c
encryption cipher | -l username | -m HMAC algorithm | -p port-
number | -v {1 | 2}]
Parameters
vrf vrf-name (OPTIONAL) Enter the keyword vrf aand then the name of
the VRF to specify the VRF used with the SSH session.
NOTE: The VRF configured using this command has a
higher precedence than the VRF configured using the ip
ssh vrf vrf-name command. If you do not configure
a VRF using this command, then the SSH client uses the
configured VRF (if any). If there is a mismatch between
VRFs that are configured using the ip ssh source-
interface
command and the ssh vrf vrf-name
command, then an error is reported.
hostname (OPTIONAL) Enter the IP address or the host name of the
remote device.
vrf instance (OPTIONAL) E-Series Only: Enter the keyword vrf then the
VRF Instance name to open an SSH connection to that
instance.
ipv4 address (OPTIONAL) Enter the IP address in dotted decimal format
A.B.C.D.
ipv6-address
prefix-length
(OPTIONAL) Enter the IPv6 address in the x:x:x:x::x format
then the prefix length in the /x format. The range is from /0
to /128.
NOTE: The :: notation specifies successive hexadecimal
fields of zeros.
-c encryption
cipher
Enable the “FIPS mode enable", this mode will support only
v2 client.
1658
Security