Dell S6100 Configuration Manual page 1458

Hide thumbs Also See for S6100:
Table of Contents

Advertisement

Example
Dell# show ip ssh rsa-authentication my-authorized-keys
ssh-rsa
AAAAB3NzaC1yc2EAAAABIwAAAIEAyB17l4gFp4r2DRHIvMc1VZ
d0Sg5GQxRV1y1X1JOMeO6Nd0WuYyzrQMM
4qJAoBwtneOXfLBcHF3V2hcMIqaZN+CRCnw/
zCMlnCf0+qVTd1oofsea5r09kS0xTp0CNfHXZ3NuGCq9Ov33m9+
U9tMwhS8vy8AVxdH4x4km3c3t5Jvc=
freedom@poclab4
Dell#
Related Commands
ssh
Open an SSH connection specifying the hostname, username, encryption cipher, HMAC algorithm, port number, and version of the SSH
client.
Syntax
ssh [vrf vrf-name] {hostname | ipv4 address | ipv6 address} [-c encryption
cipher | -l username | -m HMAC algorithm | -p port-number | -v {1 | 2}]
Parameters
vrf vrf-name
hostname
vrf instance
ipv4 address
ipv6-address prefix-
length
-c encryption cipher Enable the "FIPS mode enable", this mode will support only v2 client.
1458
Security
ip ssh rsa-authentication (Config)
NOTE:
Some of the parameters in this command require licensing to access. For more information,
contact your Dell Networking representative.
(OPTIONAL) Enter the keyword vrf aand then the name of the VRF to specify the VRF
used with the SSH session.
NOTE:
the VRF configured using the ip ssh vrf vrf-name command. If you do
not configure a VRF using this command, then the SSH client uses the
configured VRF (if any). If there is a mismatch between VRFs that are
configured using the ip ssh source-interface command and the ssh
vrf vrf-name command, then an error is reported.
(OPTIONAL) Enter the IP address or the host name of the remote device.
(OPTIONAL) E-Series Only: Enter the keyword vrf then the VRF Instance name to open
an SSH connection to that instance.
(OPTIONAL) Enter the IP address in dotted decimal format A.B.C.D.
(OPTIONAL) Enter the IPv6 address in the x:x:x:x::x format then the prefix length in
the /x format. The range is from /0 to /128.
NOTE:
"no fips mode enable"(disable) will support v1 & v2 client. This comment is applicable for
both ciphers & HMAC algorithms:
3des-cbc: Force ssh to use 3des-cbc encryption cipher.
aes128-cbc : Force ssh to use aes128-cbc encryption cipher
aes192-cbc : Force ssh to use aes192-cbc encryption cipher
aes256-cbc : Force ssh to use aes256-cbc encryption cipher
— configures the RSA authorized keys.
The VRF configured using this command has a higher precedence than
The :: notation specifies successive hexadecimal fields of zeros.

Advertisement

Table of Contents
loading

Table of Contents