Administrator Guide

10.16.127.141
Dell#
Related
Commands
ssh enables a user.
ssh
Open an SSH connection specifying the host name, username, port number and version of the SSH client.
Dell Networking OS supports both inbound and outbound SSH sessions using IPv4 addressing. Inbound SSH supports accessing
the system through the management interface as well as through a physical Layer 3 interface.
Syntax
ssh {hostname | ipv4 address} [-| username | -p port-number|-v {1|2}]
Parameters
hostname
(OPTIONAL) Enter the IP address or the host name of the remote device.
ipv4 address
(OPTIONAL) Enter the IP address in dotted decimal format A.B.C.D.
-l
username
(OPTIONAL) Enter the keyword -l followed by the user name used in this SSH
session. The default is the user name of the user associated with the terminal.
-p
port-number
(OPTIONAL) Enter the keyword -p followed by the port number. The range is from
1 to 65536. The default is 22.
-v {1 | 2} (OPTIONAL) Enter the keyword -v then the SSH version 1 or 2. The default is the
version from the protocol negotiation.
Defaults As shown in the Parameters section.
Command Modes EXEC Privilege
Supported Modes All Modes
Command
History
Version Description
8.3.17.0 Supported on the M I/O Aggregator.
Example
Dell#ssh 10.16.151.48 -l anvltest
Trying 10.16.151.48...
01:18:16: %STKUNIT0-M:CP %SEC-5-SSH_USAGE: Initiated SSH Client v2 (FIPS
Disabled) to anvltest@10.16.151.48 by default from console
anvltest@10.16.151.48's password:
Last login: Thu Jan 5 00:17:47 2012 from login-maa-101
[anvltest@dt-maa-linux-1 ~]# exit
logout
Dell#
username
Establish an authentication system based on user names.
Syntax
username name access-list-name [nopassword | {password | secret}
[encryption-type] password] [privilege level]
If you do not want a specific user to enter a password, use the nopassword option.
To delete authentication for a user, use the no username name command.
Parameters
name
Enter a text string for the name of the user up to 63 characters.
access-list-name
Enter the name of a configured access control list (either an IP access control list
or MAC access control list).
Security 277