Users Guide

Usage
Information
You can select one or more MAC algorithms from the list.
Client-supported MAC list gets preference over the server-supported MAC list in selecting the MAC
algorithm for the SSH session.
When the MAC (-m) option is used with the SSH CLI, it overrides the configured or default MAC list.
When FIPS is enabled or disabled, the client MACs get default configuration.
ip ssh rekey
Configures the time rekey-interval or volume rekey-limit threshold at which to re-generate the SSH key during an SSH session.
C9000 Series
Syntax
ip ssh rekey [time rekey-interval] [volume rekey-limit]
To reset to the default, use no ip ssh rekey [time rekey-interval] [volume rekey-
limit] command.
Parameters
time
minutes
Enter the keywords time then the amount of time in minutes. The range is from 10
to 1440 minutes. The default is 60 minutes
volume
rekey-
limit
Enter the keywords volume then the amount of volume in megabytes. The range is
from 1 to 4096 to megabytes. The default is 1024 megabytes
Defaults The default time is 60 minutes. The default volume is 1024 megabytes.
Command Modes CONFIGURATION mode
Command
History
This guide is platform-specific. For command information about other platforms, refer to the relevant Dell
Networking OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command.
Version Description
9.9(0.0) Introduced on the C9010.
9.5(0.1) Introduced on the Z9500.
9.5(0.0) Introduced on the Z9000, S6000, S4820T, S4810, and MXL.
ip ssh rhostsfile
Specify the rhost file used for host-based authorization.
C9000 Series
Syntax
ip ssh rhostsfile {WORD}
Parameters
WORD
Enter the rhost file name for the host-based authentication.
Defaults none
Command Modes CONFIGURATION
Command
History
This guide is platform-specific. For command information about other platforms, refer to the relevant Dell
Networking OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command.
Security 1485