Hide thumbs Also See for Z9500:
Table of Contents

Advertisement

Version
8.3.7.0
7.6.1.0
7.5.1.0
6.1.1.0
Usage
This command displays the contents of the flash:/ADMIN_DIR/ssh/
Information
authorized-keys.username file.
Example
Dell#show ip ssh rsa-authentication my-authorized-keys
ssh-rsa
AAAAB3NzaC1yc2EAAAABIwAAAIEAyB17l4gFp4r2DRHIvMc1VZd0Sg5GQxRV1y1
X1JOMeO6Nd0WuYyzrQMM
4qJAoBwtneOXfLBcHF3V2hcMIqaZN+CRCnw/
zCMlnCf0+qVTd1oofsea5r09kS0xTp0CNfHXZ3NuGCq9Ov33m9+U9tMwhS8vy8A
VxdH4x4km3c3t5Jvc=
freedom@poclab4
Dell#
Related
ip ssh rsa-authentication (Config)
Commands

ssh

Open an SSH connection specifying the hostname, username, encryption cipher, HMAC algorithm, port
number, and version of the SSH client.
Z9500
Syntax
ssh[vrf vrf-name] {hostname | ipv4 address | ipv6 address} [-c
encryption cipher | -l username | -m HMAC algorithm | -p port-
number | -v {1 | 2}]
Parameters
vrf vrf-name
hostname
Security
Description
Introduced on the S4810.
Introduced on the S-Series.
Introduced on the C-Series.
Introduced on the E-Series.
NOTE: Some of the parameters in this command require licensing to access.
For more information, contact your Dell Networking representative.
(OPTIONAL) Enter the keyword vrf aand then the name of
the VRF to specify the VRF used with the SSH session.
NOTE: The VRF configured using this command has a
higher precedence than the VRF configured using the ip
ssh vrf vrf-name command. If you do not configure
a VRF using this command, then the SSH client uses the
configured VRF (if any). If there is a mismatch between
VRFs that are configured using the ip ssh source-
interface command and the ssh vrf vrf-name
command, then an error is reported.
(OPTIONAL) Enter the IP address or the host name of the
remote device.
— configures the RSA authorized keys.
1627

Advertisement

Table of Contents
loading

Table of Contents