Service Manual

Version Description
9.8(0.0P2) Introduced on the S3048-ON.
9.7(0.0) Introduced on the S6000–ON.
9.2(1.0) Introduced on the Z9500.
9.0.2.0 Introduced on the S6000.
8.3.19.0 Introduced on the S4820T.
8.3.11.1 Introduced on the Z9000.
8.3.7.0 Introduced on the S4810.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series.
pre-6.1.1.0 Introduced on the E-Series.
Usage Information This command displays the contents of the flash:/ADMIN_DIR/ssh/authorized-keys.username
le.
Example
Dell#show ip ssh rsa-authentication my-authorized-keys
ssh-rsa
AAAAB3NzaC1yc2EAAAABIwAAAIEAyB17l4gFp4r2DRHIvMc1V
Zd0Sg5GQxRV1y1X1JOMeO6Nd0WuYyzrQMM
4qJAoBwtneOXfLBcHF3V2hcMIqaZN+CRCnw/
zCMlnCf0+qVTd1oofsea5r09kS0xTp0CNfHXZ3NuGCq
9Ov33m9+U9tMwhS8vy8AVxdH4x4km3c3t5Jvc=
freedom@poclab4
Dell#
Related Commands ip ssh rsa-authentication (Cong)congures the RSA authorized keys.
ssh
Open an SSH connection specifying the hostname, username, encryption cipher, HMAC algorithm, port number, and version of the
SSH client.
Syntax
NOTE: Some of the parameters in this command require licensing to access. For more information,
contact your Dell Networking representative.
ssh {hostname | ipv4 address | ipv6 address} [-c encryption cipher | -l
username | -m HMAC algorithm | -p port-number | -v {1 | 2}]
Parameters
vrf vrf-name (OPTIONAL) Enter the keyword vrf aand then the name of the VRF to specify
the VRF used with the SSH session.
NOTE: The VRF congured using this command has a higher precedence
than the VRF congured using the ip ssh vrf vrf-name command. If
you do not congure a VRF using this command, then the SSH client uses
the congured VRF (if any). If there is a mismatch between VRFs that are
congured using the ip ssh source-interface command and the
ssh vrf vrf-name command, then an error is reported.
hostname (OPTIONAL) Enter the IP address or the host name of the remote device.
1336
Security