Example
Dell# show ip ssh rsa-authentication my-authorized-keys
ssh-rsa
AAAAB3NzaC1yc2EAAAABIwAAAIEAyB17l4gFp4r2DRHIvMc1VZ
d0Sg5GQxRV1y1X1JOMeO6Nd0WuYyzrQMM
4qJAoBwtneOXfLBcHF3V2hCRCnw/
zqVTd1oofsea5r09kS0xTp0CNfHXZ3NuGCq
U9tMwhS8vy8AVxdH4x4km3c3t5Jvc=
freedom@poclab4
Dell#
Related Commands
•
ip ssh rsa-authentication (Config)
— configures the RSA authorized keys.
ssh
Open an SSH connection specifying the hostname, username, encryption cipher, HMAC algorithm, port number, and version of the SSH
client.
Syntax
NOTE:
Some of the parameters in this command require licensing to access. For more information,
contact your Dell Networking representative.
ssh [vrf
vrf-name
] {
hostname
|
ipv4 address
|
ipv6 address
} [-c
encryption
cipher
| -l
username
| -m
HMAC algorithm
| -p
port-number
| -v {1 | 2}]
Parameters
vrf
vrf-name
(OPTIONAL) Enter the keyword
vrf
aand then the name of the VRF to specify the VRF
used with the SSH session.
NOTE:
The VRF configured using this command has a higher precedence than
the VRF configured using the
ip ssh vrf vrf-name
command. If you do
not configure a VRF using this command, then the SSH client uses the
configured VRF (if any). If there is a mismatch between VRFs that are
configured using the
ip ssh source-interface
command and the
ssh
vrf vrf-name
command, then an error is reported.
hostname
(OPTIONAL) Enter the IP address or the host name of the remote device.
vrf instance
(OPTIONAL) E-Series Only: Enter the keyword
vrf
then the VRF Instance name to open
an SSH connection to that instance.
ipv4 address
(OPTIONAL) Enter the IP address in dotted decimal format A.B.C.D.
ipv6-address prefix-
length
(OPTIONAL) Enter the IPv6 address in the x:x:x:x::x format then the prefix length in
the /x format. The range is from /0 to /128.
NOTE:
The :: notation specifies successive hexadecimal fields of zeros.
-c
encryption cipher
Enable the “FIPS mode enable", this mode will support only v2 client.
"no fips mode enable"(disable) will support v1 & v2 client. This comment is applicable for
both ciphers & HMAC algorithms:
•
3des-cbc
: Force ssh to use 3des-cbc encryption cipher.
•
aes128-cbc
: Force ssh to use aes128-cbc encryption cipher
•
aes192-cbc
: Force ssh to use aes192-cbc encryption cipher
•
aes256-cbc
: Force ssh to use aes256-cbc encryption cipher
1458
Security
Содержание S6100
Страница 1: ...Dell Command Line Reference Guide for the S6100 ON System 9 11 2 0P1 ...
Страница 474: ...protocol list ttl0 ttl1 Dell 474 Control Plane Policing CoPP ...
Страница 979: ... show lldp neighbors display the LLDP neighbors Link Layer Discovery Protocol LLDP 979 ...
Страница 1627: ... uplink state group creates an uplink state group and enables the tracking of upstream links Uplink Failure Detection UFD 1627 ...