Omitir para ir al contenido principal
  • Hacer pedidos rápida y fácilmente
  • Ver pedidos y realizar seguimiento al estado del envío
  • Cree y acceda a una lista de sus productos
  • Administre sus sitios, productos y contactos de nivel de producto de Dell EMC con Administración de la empresa.

Dell PowerEdge FN I/O Module Command Line Reference Guide 9.10(0.0)

PDF

ssh

Open an SSH connection specifying the hostname, username, port number, and version of the SSH client.

Syntax ssh { hostname | ipv4 address | ipv6 address} [ -c encryption cipher | -l username | -m HMAC alogorithm | -p port-number | -v {1|2}]
Parameters
hostname (OPTIONAL) Enter the IP address or the hostname of the remote device.
ipv4 address (OPTIONAL) Enter the IP address in dotted decimal format A.B.C.D.
ipv6 address prefix-length (OPTIONAL) Enter the IPv6 address in the x:x:x:x::x format then the prefix length in the /x format. The range is from /0 to /128
  • NOTE: The :: notation specifies successive hexadecimal fields of zeros.
-c encryption cipher Enter the following encryption cipher to use. (For v2 clients only.) Without the FIPS mode enabled:
  • 3des-cbc: Force ssh to use 3des-cbc encryption cipher.

With the FIPS mode enabled:

  • aes128–cbc: Force ssh to use the aes128–cbc encryption cipher.
  • aes256–cbc: Force ssh to use the aes256–cbc encryption cipher.
-l username (OPTIONAL) Enter the keyword —l then the user name used in this SSH session. The default is the user name of the user associated with the terminal.
-m HMAC algorithm Enter one of the following HMAC algorithms to use. (For v2 clients only.):

Without the FIPS mode enabled:

  • hmac-sha1: Force ssh to use the hmac-sha1 HMAC algorithm.
  • hmac-shal-96: Force ssh to use the hmac-sha1–96 HMAC algorithm.
  • hmac-md5: Force ssh to use the hmac-md5 HMAC algorithm.
  • hmac-md5–96: Force ssh to use the hmac-md5–96 HMAC algorithm.

With the FIPS mode enabled:

  • hmac-sha1: Force ssh to use the hmac-sha1 HMAC algorithm.
  • hmac-sha1–96: Force ssh to use the hmac-sha1–96 HMAC algorithm.
-p port-number (OPTIONAL) Enter the keyword —p then the port number.

The range is 1 to 65536

The default is 22

-v {1|2} (OPTIONAL) Enter the keyword —v then the SSH version 1 or 2.

The default: The version from the protocol negotiation.

  • NOTE: If the FIPS mode is enabled, this option does not display in the output.
Defaults As indicated above.
Command Modes EXEC Privilege
Supported Modes Full–Switch
Command History
Version Description
9.9(0.0) Introduced on the FN IOM.
9.2(0.0) Introduced on the MXL 10/40GbE Switch IO Module.
Example

If FIPS mode is not enabled:

Dell#ssh 10.11.8.12 ?
                                             -c		Encryption cipher to use (for v2 client
                                             -l 	User name option
                                             -m 	HMAC algorithm to use (for v2 clients only)
                                             -p 	SSH server port option (default 22)
                                             -v 	SSH protocol version
                                             <cr>
                                             Dell#ssh 10.11.8.12 -c ?
                                             3des-cbc 	Force ssh to use 3des-cbc encryption cipher
                                             Dell#ssh 10.11.8.12 -m ?
                                             hmac-sha1 	Force ssh to use hmac-sha1 HMAC algorithm
                                             hmac-sha1-96 	Force ssh to use hmac-sha1-96 HMAC algorithm
                                             hmac-md5 	Force ssh to use hmac-md5 HMAC algorithm
                                             hmac-md5-96 	Force ssh to use hmac-md5-96 HMAC algorithm
                                             
                                          

With FIPS mode enabled:

Dell#ssh 10.11.8.12 ?
                                             -c		Encryption cipher to use (for v2 client
                                             -l 	User name option
                                             -m 	HMAC algorithm to use (for v2 clients only)
                                             -p 	SSH server port option (default 22)
                                             <cr>
                                             Dell#ssh 10.11.8.12 -c ?
                                             aes128-cbc 	Force ssh to use aes128-cbc encryption cipher
                                             aes256-cbc 	Force ssh to use aes256-cbc encryption cipher
                                             Dell#ssh 10.11.8.12 -m ?
                                             hmac-sha1 	Force ssh to use hmac-sha1 HMAC algorithm
                                             hmac-sha1-96 	Force ssh to use hmac-sha1-96 HMAC algorithm
                                             
                                          

Califique este contenido

Preciso
Útil
Fácil de comprender
¿Este artículo fue útil?
0/3000 characters
  Proporcione calificaciones (1 a 5 estrellas).
  Proporcione calificaciones (1 a 5 estrellas).
  Proporcione calificaciones (1 a 5 estrellas).
  Seleccione si el artículo fue útil o no.
  Los comentarios no pueden contener estos caracteres especiales: <>"(", ")", "\"