Reference Guide
1322 | Security
www.dell.com | support.dell.com
Defaults
As above.
Command Modes
EXEC Privilege
Command
History
Example
Figure 51-14. ssh Command Example
Trace List Commands
IP trace lists create an Access Control List (ACLs) to trace all traffic into the E-Series switch. This
feature is useful for tracing Denial of Service (DOS) attacks.
• clear counters ip trace-group
• deny
• deny tcp
• deny udp
• ip trace-group
• ip trace-list
• permit
• permit tcp
• permit udp
• seq
• show config
• show ip accounting trace-lists
clear counters ip trace-group
e
Erase all counters maintained for trace lists.
Syntax
clear counters ip trace-group [trace-list-name]
-p port-number
(OPTIONAL) Enter the keyword -p followed by the port number.
Range: 1 to 65536
Default: 22
-v {1 | 2}
(OPTIONAL) Enter the keyword -v followed by the SSH version 1 or 2.
Default: The version from the protocol negotiation
Version 7.9.1.0 Introduced VRF
Version 7.6.1.0 Introduced for S-Series
Version 7.5.1.0 Added IPv6 support; Introduced for C-Series
pre-Version 6.1.1.0 Introduced for E-Series
FTOS#ssh 123.12.1.123 -l ashwani -p 5005 -v 2
Note: For other Access Control List commands, see the chapters Chapter 10, ACL VLAN
Group and Chapter 9, Access Control Lists (ACL).