Users Guide

Table Of Contents
ssh
Starts an SSH client session.
Syntax
ssh [vrf {management | vrf-name} {-b source-ip-address] [-B source-
interface] [-c encryption-cypher] [-l username] [-m HMAC-algorithm] [-p
port-number] [-h] destination
Parameters
vrf management - (Optional) SSH to an IP address in a management VRF instance.
vrf vrf-name - (Optional) SSH to an IP address to a specified VRF instance.
-b source-ip-address - (Optional) Enter the source IPv4 or IPv6 address. If not mentioned, this
option chooses the source address corresponding to the destination address from the route table.
-B source-intherface - (Optional) Enter the source interface name without spaces. If not
mentioned, this option chooses the source address corresponding to the destination interface from
the route table.
For a physical Ethernet interface, enter ethernet<node/slot/port>; for example, ethernet1/1/1.
For a VLAN interface, enter vlan<vlan-id;> for example, vlan10.
For a Loopback interface, enter loopback<id>; for example, loopback1.
For Virtual-Network, enter virtual-network<vn-id>; for example, virtual-network20.
For a port-channel interface, enter port-channelchannel-id; for example, port-channel11.
-c encryption-cypher - (Optional) Enter the supported encryption ciphers. You can issue
multi encryption ciphers. For example, ssh -c chacha20-poly1305@openssh.com,aes128-
ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
9.1.1.2. Following is the default list of Cipher algorithms used by SSH Client for establishing the
session when cipher algorithm is not explicitly mentioned by user, the first cipher algorithm matching
the SSH server's list will be used for encryption.
chacha20-poly1305@openssh.com
aes128-ctr
aes192-ctr
aes256-ctr
aes128-gcm@openssh.com
aes256-gcm@openssh.com
Following is the list of additional Ciphers supported in OS10 SSH Client CLI:
3des-cbc
aes128-cbc
aes192-cbc
aes256-cbc
-l username - (Optional) Enter the session username. If username is not specified, the current
session username from which SSH client command is invoked is used to initiate an SSH session.
-m HMAC-algorithm - (Optional) Enter the supported Host Message Authentication
Code algorithm. You can issue multiple HMAC algorithms. For example,
ssh -m umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-
etm@openssh.com 9.1.1.2. Following is the default list of Message Authentication code used
by SSH Client for establishing the session when HMAC is not explicitly mentioned by user, the first
HMAC matching the SSH server's list will be used for authentication.
umac-64-etm@openssh.com
umac-128-etm@openssh.com
hmac-sha2-256-etm@openssh.com
hmac-sha2-512-etm@openssh.com
hmac-sha1-etm@openssh.com
umac-64@openssh.com
umac-128@openssh.com
hmac-sha2-256
hmac-sha2-512
hmac-sha1
Following is the list of additional HMAC's supported in OS10 SSH Client CLI:
hmac-md5
Security
1351