Dell Command Line Reference Guide for the S4048–ON System 9.14.2.8

PDF

ssh

Open an SSH connection specifying the hostname, username, port number, and version of the SSH client.

Syntax
ssh {hostname|ipv4 address|ipv6 address} [-c encryption cipher|-l username|-m HMAC alogorithm|-p port-number|-v 2]
Parameters
hostname
(OPTIONAL) Enter the IP address or the hostname of the remote device.
ipv4 address
(OPTIONAL) Enter the IP address in dotted decimal format A.B.C.D.
ipv6 addressprefix
(OPTIONAL) Enter the IPv6 address in the x:x:x:x::x format then the prefix length in the /x format. The range is from /0 to /128
NOTE: The :: notation specifies successive hexadecimal fields of zeros.
-c encryption cipher
Enter the following encryption cipher to use. (For v2 clients only.)
  • 3des-cbc: Force ssh to use 3des-cbc encryption cipher.

FIPS mode is enabled or disabled:

  • aes256–ctr: Force ssh to use the aes256–ctr encryption cipher.
  • aes256–cbc: Force ssh to use the aes128–cbc encryption cipher.
  • aes192–ctr: Force ssh to use the aes128–cbc encryption cipher.
  • aes192–cbc: Force ssh to use the aes256–cbc encryption cipher.
  • aes128–ctr: Force ssh to use the aes256–cbc encryption cipher.
  • aes128–cbc: Force ssh to use the aes128–cbc encryption cipher.
  • 3des-cbc: Force ssh to use 3des-cbc encryption cipher.
-l username
(OPTIONAL) Enter the keyword —l then the user name used in this SSH session. The default is the user name of the user associated with the terminal.
-m HMAC algorithm
Enter one of the following HMAC algorithms to use. (For v2 clients only.):

Without the FIPS mode enabled:

  • hmac-shal-96: Force ssh to use the hmac-sha1–96 HMAC algorithm.
  • hmac-sha1: Force ssh to use the hmac-sha1 HMAC algorithm.
  • hmac-md5–96: Force ssh to use the hmac-md5–96 HMAC algorithm.
  • hmac-md5: Force ssh to use the hmac-md5 HMAC algorithm.

With the FIPS mode enabled:

  • hmac-sha2-256: Force ssh to use the hmac-sha2-256 HMAC algorithm.
  • hmac-shal-96: Force ssh to use the hmac-sha1–96 HMAC algorithm.
  • hmac-sha1: Force ssh to use the hmac-sha1 HMAC algorithm.
  • hmac-md5–96: Force ssh to use the hmac-md5–96 HMAC algorithm.
  • hmac-md5: Force ssh to use the hmac-md5 HMAC algorithm.
-p port-number
(OPTIONAL) Enter the keyword —p then the port number.

The range is 1 to 65535.

-v 2
(OPTIONAL) Enter the keyword —v then the SSH version 2.

The default: The version from the protocol negotiation.

NOTE: If the FIPS mode is enabled, this option does not display in the output.
Defaults
See Parameters.
Command Modes
EXEC Privilege
Command History

This guide is platform-specific. For command information about other platforms, see the relevant Dell EMC Networking OS Command Line Reference Guide.

Version
Description
9.10(0.0)
Removed the support for hmac-sha2-256-96 algorithm.
9.8(0.0P5)
Introduced on the S4048-ON.
9.8(0.0P2)
Introduced on the S3048-ON.
9.5(0.1)
Introduced on the Z9500.
9.1(0.0)
Introduced on the Z9000.
8.3.19.0
Introduced on the S4820T.
8.3.12.0
Introduced on the S4810.
Related Commands
ip ssh server
Configure an SSH server.
show ip ssh client-pub-keys
Display the client-public keys.
Usage Information

Dell EMC Networking OS supports both inbound and outbound SSH sessions using IPv4 or IPv6 addressing. Inbound SSH supports accessing the system through the management interface as well as through a physical Layer 3 interface.

NOTE: Some of the parameters in this command require licensing to access. For more information, contact your Dell EMC Networking representative.
Example

If FIPS mode is not enabled:

DellEMC# ssh 10.10.10.10 ?
-c   Encryption cipher to use (for v2 clients only)
-l   User name option
-m   HMAC algorithm to use (for v2 clients only)
-p   SSH server port option (default 22)
-v   SSH protocol version
<cr>
DellEMC# ssh 10.10.10.10 -c ?
3des-cbc    			Force ssh to use 3des-cbc encryption cipher
aes128-cbc  			Force ssh to use aes128-cbc encryption cipher
aes192-cbc  			Force ssh to use aes192-cbc encryption cipher
aes256-cbc  			Force ssh to use aes256-cbc encryption cipher
aes128-ctr  			Force ssh to use aes128-ctr encryption cipher
aes192-ctr 			Force ssh to use aes192-ctr encryption cipher
aes256-ctr  			Force ssh to use aes256-ctr encryption cipher
DellEMC# ssh 10.10.10.10 -m ?
hmac-md5          Force ssh to use hmac-md5 HMAC algorithm
hmac-md5-96       Force ssh to use hmac-md5-96 HMAC algorithm
hmac-sha1         Force ssh to use hmac-sha1 HMAC algorithm
hmac-sha1-96      Force ssh to use hmac-sha1-96 HMAC algorithm
hmac-sha2-256     Force ssh to use hmac-sha2-256 HMAC algorithm

With FIPS mode enabled:

DellEMC# ssh 10.10.10.10 ?
-c   Encryption cipher to use (for v2 clients only)
-l   User name option
-m   HMAC algorithm to use (for v2 clients only)
-p   SSH server port option (default 22)
<cr>
DellEMC# ssh 10.10.10.10 -c ?
3des-cbc         Force ssh to use 3des-cbc encryption cipher
aes128-cbc       Force ssh to use aes128-cbc encryption cipher
aes192-cbc       Force ssh to use aes192-cbc encryption cipher
aes256-cbc       Force ssh to use aes256-cbc encryption cipher
aes128-ctr       Force ssh to use aes128-ctr encryption cipher
aes192-ctr       Force ssh to use aes192-ctr encryption cipher
aes256-ctr       Force ssh to use aes256-ctr encryption cipher
DellEMC#ssh 10.10.10.10 -m ?
hmac-sha1        Force ssh to use hmac-sha1 HMAC algorithm
hmac-sha1-96     Force ssh to use hmac-sha1-96 HMAC algorithm
hmac-sha2-256    Force ssh to use hmac-sha2-256 HMAC algorithm

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\