Users Guide

ssh
Open an SSH connection specifying the hostname, username, encryption cipher, HMAC algorithm, port number, and version of the
SSH client.
Syntax
NOTE: Some of the parameters in this command require licensing to access. For more information,
contact your Dell Networking representative.
ssh [vrf vrf-name] {hostname | ipv4 address | ipv6 address} [-c encryption
cipher | -l username | -m HMAC algorithm | -p port-number | -v {1 | 2}]
Parameters
vrf vrf-name (OPTIONAL) Enter the keyword vrf aand then the name of the VRF to specify
the VRF used with the SSH session.
NOTE: The VRF congured using this command has a higher precedence
than the VRF congured using the ip ssh vrf vrf-name command. If
you do not congure a VRF using this command, then the SSH client uses
the congured VRF (if any). If there is a mismatch between VRFs that are
congured using the ip ssh source-interface command and the
ssh vrf vrf-name command, then an error is reported.
hostname (OPTIONAL) Enter the IP address or the host name of the remote device.
vrf instance (OPTIONAL) E-Series Only: Enter the keyword vrf then the VRF Instance name
to open an SSH connection to that instance.
ipv4 address (OPTIONAL) Enter the IP address in dotted decimal format A.B.C.D.
ipv6-address prex-
length
(OPTIONAL) Enter the IPv6 address in the x:x:x:x::x format then the prex length
in the /x format. The range is from /0 to /128.
NOTE: The :: notation species successive hexadecimal elds of zeros.
-c encryption cipher Enable the “FIPS mode enable", this mode will support only v2 client.
"no ps mode enable"(disable) will support v1 & v2 client. This comment is
applicable for both ciphers & HMAC algorithms:
3des-cbc: Force ssh to use 3des-cbc encryption cipher.
aes128-cbc : Force ssh to use aes128-cbc encryption cipher
aes192-cbc : Force ssh to use aes192-cbc encryption cipher
aes256-cbc : Force ssh to use aes256-cbc encryption cipher
aes128-ctr : Force ssh to use aes128-ctr encryption cipher
aes192-ctr : Force ssh to use aes192-ctr encryption cipher
aes256-ctr : Force ssh to use aes256-ctr encryption cipher
-l username (OPTIONAL) Enter the keyword -l then the user name used in this SSH session.
The default is the user name of the user associated with the terminal.
-m HMAC
algorithm
Enter one of the following HMAC algorithms to use. (For v2 clients only):
"no ps mode enable"(disable) will support v1 & v2 client.
hmac-md5: Force ssh to use hmac-md5 HMAC algorithm.
hmac-md5-96: Force ssh to use hmac-md5-96 HMAC algorithm.
hmac-sha1: Force ssh to use hmac-sha1 HMAC algorithm.
Security
1449