Command Line Reference Guide
Command Modes EXEC
Command History
Version 9.0(1.3) Introduced on the S5000.
Usage
Information
This command displays the contents of the flash:/ADMIN_DIR/ssh/authorized-
keys.username
file.
Example
FTOS#show ip ssh rsa-authentication my-authorized-keys
ssh-rsa
AAAAB3NzaC1yc2EAAAABIwAAAIEAyB17l4gFp4r2DRHIvMc1VZd0Sg5GQxRV1y1
X1JOMeO6Nd0WuYyzrQMM
4qJAoBwtneOXfLBcHF3V2hcMIqaZN+CRCnw/
zCMlnCf0+qVTd1oofsea5r09kS0xTp0CNfHXZ3NuGCq9Ov33m9+U9tMwhS8vy8A
VxdH4x4km3c3t5Jvc=
freedom@poclab4
FTOS#
Related
Commands
ip ssh rsa-authentication (Config) – configures the RSA authorized keys.
ssh
Open an SSH connection specifying the hostname, username, port number and version of the SSH client.
S5000
Syntax
NOTE: Some of the parameters in this command require licensing to access. For more
information, contact your Dell Networking representative.
ssh {hostname | ipv4 address | ipv6 address} [-c encryption
cipher | -l username | -m HMAC algorithm | -p port-number | -v
{1 | 2}]
Parameters
hostname
(OPTIONAL) Enter the IP address or the hostname of the remote
device.
ipv4 address
(OPTIONAL) Enter the IP address in dotted decimal format A.B.C.D.
ipv6-address
prefix-length
(OPTIONAL) Enter the IPv6 address in the x:x:x:x::x format followed by
the prefix length in the /x format. The range is /0 to /128.
NOTE: The :: notation specifies successive hexadecimal fields of
zeros.
-c
encryption
cipher
Enter the following encryption cipher. (For v2 clients only.):
• 3des-cbc: Force ssh to use 3des-cbc encryption cipher.
-l
username
(OPTIONAL) Enter the keyword -l followed by the user name used in
this SSH session. The default is the user name of the user associated
with the terminal.
1167