Dell 9.8(0.0) Switch User Manual


  Open as PDF
of 1905
 
Version Description
8.3.7.0 Introduced on the S4810.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series.
6.1.1.0 Introduced on the E-Series.
Usage
Information
This command displays the contents of the flash:/ADMIN_DIR/ssh/
authorized-keys.username file.
Example
Dell#show ip ssh rsa-authentication my-authorized-keys
ssh-rsa
AAAAB3NzaC1yc2EAAAABIwAAAIEAyB17l4gFp4r2DRHIvMc1VZd0Sg5GQxRV1y1
X1JOMeO6Nd0WuYyzrQMM
4qJAoBwtneOXfLBcHF3V2hcMIqaZN+CRCnw/
zCMlnCf0+qVTd1oofsea5r09kS0xTp0CNfHXZ3NuGCq9Ov33m9+U9tMwhS8vy8A
VxdH4x4km3c3t5Jvc=
freedom@poclab4
Dell#
Related
Commands
ip ssh rsa-authentication (Config) — configures the RSA authorized keys.
ssh
Open an SSH connection specifying the hostname, username, encryption cipher, HMAC algorithm, port
number, and version of the SSH client.
Z9500
Syntax
NOTE: Some of the parameters in this command require licensing to access.
For more information, contact your Dell Networking representative.
ssh[vrf vrf-name] {hostname | ipv4 address | ipv6 address} [-c
encryption cipher | -l username | -m HMAC algorithm | -p port-
number | -v {1 | 2}]
Parameters
vrf vrf-name (OPTIONAL) Enter the keyword vrf aand then the name of
the VRF to specify the VRF used with the SSH session.
NOTE: The VRF configured using this command has a
higher precedence than the VRF configured using the ip
ssh vrf
vrf-name command. If you do not configure
a VRF using this command, then the SSH client uses the
configured VRF (if any). If there is a mismatch between
VRFs that are configured using the ip ssh source-
interface command and the ssh vrf vrf-name
command, then an error is reported.
Security
1673