Reference Guide

Usage
Information
FTOS supports both inbound and outbound SSH sessions using IPv4 or IPv6 addressing.
Inbound SSH supports accessing the system through the management interface as well as
through a physical Layer 3 interface.
Example
FTOS#ssh 10.11.8.12 ?
-c Encryption cipher to use (for v2 clients only)
-l User name option
-m HMAC algorithm to use (for v2 clients only)
-p SSH server port option (default 22)
-v SSH protocol version
<cr>
FTOS#ssh 10.11.8.12 -c ?
3des-cbc Force ssh to use 3des-cbc encryption cipher
FTOS#ssh 10.11.8.12 -m ?
hmac-sha1 Force ssh to use hmac-sha1 HMAC algorithm
hmac-sha1-96 Force ssh to use hmac-sha1-96 HMAC algorithm
hmac-md5 Force ssh to use hmac-md5 HMAC algorithm
hmac-md5-96 Force ssh to use hmac-md5-96 HMAC algorithm
Secure DHCP Commands
DHCP as defined by RFC 2131 provides no authentication or security mechanisms. Secure DHCP is a suite of features
that protects networks that use dynamic address allocation from spoofing and attacks.
clear ip dhcp snooping
Clear the DHCP binding table.
C-Series, S-Series, Z-Series
Syntax
clear ip dhcp snooping binding
Defaults none
Command Modes EXEC Privilege
Command History
Version 8.3.11.1 Introduced on the Z9000.
Version 7.8.1.0 Introduced on the C-Series and S-Series.
Related
Commands
show ip dhcp snooping – displays the contents of the DHCP binding table.
1477