Users Guide
Usage Information This command displays the contents of the flash:/ADMIN_DIR/ssh/authorized-keys.username le.
Example
Dell#show ip ssh rsa-authentication my-authorized-keys
ssh-rsa
AAAAB3NzaC1yc2EAAAABIwAAAIEAyB17l4gFp4r2DRHIvMc1VZd0Sg5GQxRV1y1X1JOMeO6Nd0WuYyzrQMM
4qJAoBwtneOXfLBcHF3V2hcMIqaZN+CRCnw/
zCMlnCf0+qVTd1oofsea5r09kS0xTp0CNfHXZ3NuGCq9Ov33m9+U9tMwhS8vy8AVxdH4x4km3c3t5Jvc=
freedom@poclab4
Dell#
Related Commands ip ssh rsa-authentication (Cong) — congures the RSA authorized keys.
ssh
Open an SSH connection specifying the hostname, username, encryption cipher, HMAC algorithm, port number, and version of the 
SSH client.
Syntax
NOTE: Some of the parameters in this command require licensing to access. For more information, 
contact your Dell Networking representative.
ssh [vrf vrf-name] {hostname | ipv4 address | ipv6 address} [-c encryption 
cipher | -l username | -m HMAC algorithm | -p port-number | -v {1 | 2}]
Parameters
vrf vrf-name (OPTIONAL) Enter the keyword vrf aand then the name of the VRF to specify 
the VRF used with the SSH session.
NOTE: The VRF congured using this command has a higher precedence 
than the VRF congured using the ip ssh vrf vrf-name command. If 
you do not congure a VRF using this command, then the SSH client uses 
the congured VRF (if any). If there is a mismatch between VRFs that are 
congured using the ip ssh source-interface command and the 
ssh vrf vrf-name command, then an error is reported.
hostname (OPTIONAL) Enter the IP address or the host name of the remote device.
vrf instance (OPTIONAL) E-Series Only: Enter the keyword vrf then the VRF Instance name 
to open an SSH connection to that instance.
ipv4 address (OPTIONAL) Enter the IP address in dotted decimal format A.B.C.D.
ipv6-address prex-
length
(OPTIONAL) Enter the IPv6 address in the x:x:x:x::x format then the prex length 
in the /x format. The range is from /0 to /128.
NOTE: The :: notation species successive hexadecimal elds of zeros.
-c encryption cipher Enable the “FIPS mode enable", this mode will support only v2 client.
"no ps mode enable"(disable) will support v1 & v2 client. This comment is 
applicable for both ciphers & HMAC algorithms:
• 3des-cbc: Force ssh to use 3des-cbc encryption cipher.
•
aes128-cbc : Force ssh to use aes128-cbc encryption cipher
• aes192-cbc : Force ssh to use aes192-cbc encryption cipher
• aes256-cbc : Force ssh to use aes256-cbc encryption cipher
• aes128-ctr : Force ssh to use aes128-ctr encryption cipher
• aes192-ctr : Force ssh to use aes192-ctr encryption cipher
Security
1385










