Administrator Guide

Table Of Contents
Related
Commands
ip ssh rsa-authentication (Config) — configures the RSA authorized keys.
ssh
Open an SSH connection specifying the hostname, username, encryption cipher, HMAC algorithm, port
number, and version of the SSH client.
Z9000
Syntax
NOTE: Some of the parameters in this command require licensing to access.
For more information, contact your Dell Networking representative.
ssh {hostname | ipv4 address | ipv6 address} [-c encryption
cipher | -l username | -m HMAC algorithm | -p port-number | -v
{1 | 2}]
Parameters
hostname (OPTIONAL) Enter the IP address or the host name of the
remote device.
vrf instance (OPTIONAL) E-Series Only: Enter the keyword vrf then the
VRF Instance name to open an SSH connection to that
instance.
ipv4 address (OPTIONAL) Enter the IP address in dotted decimal format
A.B.C.D.
ipv6-address
prefix-length
(OPTIONAL) Enter the IPv6 address in the x:x:x:x::x format
then the prefix length in the /x format. The range is from /0
to /128.
NOTE: The :: notation specifies successive hexadecimal
fields of zeros.
-c encryption
cipher
Enable the “FIPS mode enable", this mode will support only
v2 client.
"no fips mode enable"(disable) will support v1 & v2 client.
This comment is applicable for both ciphers & HMAC
algorithms:
3des-cbc: Force ssh to use 3des-cbc encryption cipher.
aes128-cbc : Force ssh to use aes128-cbc encryption
cipher
aes192-cbc : Force ssh to use aes192-cbc encryption
cipher
aes256-cbc : Force ssh to use aes256-cbc encryption
cipher
aes128-ctr : Force ssh to use aes128-ctr encryption
cipher
aes192-ctr : Force ssh to use aes192-ctr encryption
cipher
Security
1421