Administrator Guide

Version Description
8.3.19.0 Introduced on the S4820T.
8.3.11.1 Introduced on the Z9000.
8.3.7.0 Introduced on the S4810.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series.
pre-6.1.1.0 Introduced on the E-Series.
Usage Information This command displays the contents of the flash:/ADMIN_DIR/ssh/authorized-keys.username file.
Example
DellEMC# show ip ssh rsa-authentication my-authorized-keys
ssh-rsa
AAAAB3NzaC1yc2EAAAABIwAAAIEAyB17l4gFp4r2DRHIvMc1VZ
d0Sg5GQxRV1y1X1JOMeO6Nd0WuYyzrQMM
4qJAoBwtneOXfLBcHF3V2hcMIqaZN+CRCnw/
zCMlnCf0+qVTd1oofsea5r09kS0xTp0CNfHXZ3NuGCq9Ov33m9+
U9tMwhS8vy8AVxdH4x4km3c3t5Jvc=
freedom@poclab4
DellEMC#
Related
Commands
ip ssh rsa-authentication (Config) — configures the RSA authorized keys.
ssh
Open an SSH connection specifying the hostname, username, encryption cipher, HMAC algorithm, port number, and version of the SSH
client.
Syntax
NOTE: Some of the parameters in this command require licensing to access. For more information,
contact your Dell EMC Networking representative.
ssh [vrf vrf-name] {hostname | ipv4 address | ipv6 address} [-c encryption
cipher | -l username | -m HMAC algorithm | -p port-number | -v 2]
Parameters
vrf
vrf-name
(OPTIONAL) Enter the keyword vrf and then the name of the VRF to specify the VRF
used with the SSH session.
NOTE: The VRF configured using this command has a higher precedence
than the VRF configured using the ip ssh vrf vrf-name command. If you
do not configure a VRF using this command, then the SSH client uses the
configured VRF (if any). If there is a mismatch between VRFs that are
configured using the ip ssh source-interface command and the ssh
vrf vrf-name command, then an error is reported.
hostname
(OPTIONAL) Enter the IP address or the host name of the remote device.
vrf instance
(OPTIONAL) E-Series Only: Enter the keyword vrf then the VRF Instance name to open
an SSH connection to that instance.
ipv4 address
(OPTIONAL) Enter the IP address in dotted decimal format A.B.C.D.
ipv6-address
prefix-length
(OPTIONAL) Enter the IPv6 address in the x:x:x:x::x format then the prefix length in
the /x format. The range is from /0 to /128.
NOTE: The :: notation specifies successive hexadecimal fields of zeros.
-c
encryption
cipher
Enable the “FIPS mode enable", this mode will support the v2 client.
"no fips mode enable"(disable) will support v1 & v2 client. This comment is applicable for
both ciphers & HMAC algorithms:
Security 1385