Users Guide

Table Of Contents
Version Description
8.3.11.1 Introduced on the Z9000.
8.3.7.0 Introduced on the S4810.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series.
pre-6.1.1.0 Introduced on the E-Series.
Usage
Information
Enabling RSA authentication allows the user to log in without being prompted for a password. In addition,
the OpenSSH compatible SSHv2 RSA public key must be added to the list of authorized keys (ip ssh
rsa-authentication my-authorized-keys device://filename command).
ip ssh server
Syntax
NOTE: Some of the parameters in this command require licensing to access. For more information,
contact your Dell EMC Networking representative.
ip ssh server {ciphers cipher-list} {enable | port port-number} [kex key-
exchange-algorithm] [mac hmac-algorithm][version 2]
To disable SSH server functions, use the no ip ssh server {ciphers cipher-list} {enable
| port port-number} [kex key-exchange-algorithm] [mac hmac-algorithm]
command.
Parameters
enable Enter the key word enable to start the SSH server.
ciphers
cipher-
list
Enter the keyword ciphers and then a space-delimited list of ciphers that the
SSH server supports. The following ciphers are available.
3des-cbc
aes128-cbc
aes192-cbc
aes256-cbc
aes128-ctr
aes192-ctr
aes256-ctr
The default cipher list is used.
3des-cbc
aes128-cbc
aes192-cbc
aes256-cbc
aes128-ctr
aes192-ctr
aes256-ctr
mac
hmac-
algorithm
Enter the keyword mac then a space-delimited list of hash message authentication
code (HMAC) algorithms supported by the SSH server for keying hashing for the
message authentication.
The following HMAC algorithms are available:
Security 1477