Deployment Guide
1356 | Security
www.dell.com | support.dell.com
Defaults
As above.
Command Modes
EXEC Privilege
Command
History
Example
Figure 51-16. ssh Command Example
Trace List Commands
IP trace lists create an Access Control List (ACLs) to trace all traffic into the E-Series switch. This
feature is useful for tracing Denial of Service (DOS) attacks.
• clear counters ip trace-group
• deny
• deny tcp
• deny udp
• ip trace-group
• ip trace-list
• permit
• permit tcp
• permit udp
ipv6-address
prefix-length
(OPTIONAL) Enter the IPv6 address in the x:x:x:x::x format followed by the
prefix length in the
/x format.
Range: /0 to /128
Note: The
:: notation specifies successive hexadecimal fields of zeros
-ccipher
-mMAC
-l username (OPTIONAL) Enter the keyword -l followed by the user name used in this SSH
session.
Default: The user name of the user associated with the terminal.
-p port-number
(OPTIONAL) Enter the keyword -p followed by the port number.
Range: 1 to 65536
Default: 22
-v {1 | 2}
(OPTIONAL) Enter the keyword -v followed by the SSH version 1 or 2.
Default: The version from the protocol negotiation
Version Added support for VRF.
Version 7.9.1.0 Introduced VRF
Version 7.6.1.0 Introduced for S-Series
Version 7.5.1.0 Added IPv6 support; Introduced for C-Series
pre-Version 6.1.1.0 Introduced for E-Series
FTOS#ssh 123.12.1.123 -l ashwani -p 5005 -v 2
Note: For other Access Control List commands, see the chapters Chapter 10, ACL VLAN
Group and Chapter 9, Access Control Lists (ACL).










