Users Guide

Table Of Contents
Usage
Information
Use this command to view information about the established SSH sessions.
Example
OS10# show ip ssh
SSH Server: Enabled
--------------------------------------------------
SSH Server Ciphers: chacha20-poly1305@openssh.com,aes128-ctr,
aes192-ctr,aes256-ctr,
aes128-gcm@openssh.com,aes256-
gcm@openssh.com
SSH Server MACs: umac-64-etm@openssh.com,umac-128-
etm@openssh.com,
hmac-sha2-256-etm@openssh.com,
hmac-sha2-512-etm@openssh.com,
hmac-sha1-
etm@openssh.com,umac-64@openssh.com,
umac-128@openssh.com,hmac-sha2-256,
hmac-sha2-512,hmac-sha1
SSH Server KEX algorithms: curve25519-sha256@libssh.org,ecdh-sha2-
nistp256,
ecdh-sha2-nistp384,ecdh-sha2-nistp521,
diffie-hellman-group-exchange-sha256,
diffie-hellman-group14-sha1
Password Authentication: Enabled
Host-Based Authentication: Disabled
RSA Authentication: Enabled
Challenge Response Auth: Disabled
Supported
Releases
10.3.0E or later
ssh
Starts an SSH client session.
Syntax
ssh [vrf {management | vrf-name} {-b source-ip-address] [-B source-
interface] [-c encryption-cypher] [-l username] [-m HMAC-algorithm] [-p
port-number] [-h] destination
Parameters
vrf management - (Optional) SSH to an IP address in a management VRF instance.
vrf vrf-name - (Optional) SSH to an IP address to a specified VRF instance.
-b source-ip-address - (Optional) Enter the source IPv4 or IPv6 address. If not mentioned, this
option chooses the source address corresponding to the destination address from the route table.
-B source-intherface - (Optional) Enter the source interface name without spaces. If not
mentioned, this option chooses the source address corresponding to the destination interface from
the route table.
For a physical Ethernet interface, enter ethernet<node/slot/port>; for example, ethernet1/1/1.
For a VLAN interface, enter vlan<vlan-id;> for example, vlan10.
For a Loopback interface, enter loopback<id>; for example, loopback1.
For Virtual-Network, enter virtual-network<vn-id>; for example, virtual-network20.
For a port-channel interface, enter port-channelchannel-id; for example, port-channel11.
-c encryption-cypher - (Optional) Enter the supported encryption ciphers. You can issue
multi encryption ciphers. For example, ssh -c chacha20-poly1305@openssh.com,aes128-
ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
9.1.1.2. Following is the default list of Cipher algorithms used by SSH Client for establishing the
session when cipher algorithm is not explicitly mentioned by user, the first cipher algorithm matching
the SSH server's list will be used for encryption.
chacha20-poly1305@openssh.com
aes128-ctr
aes192-ctr
aes256-ctr
aes128-gcm@openssh.com
Security
1341