ssh
- ssh <value>
- SDE
M10-Smart
M2
RS420
AresC640
Hostname and address to SSH to
- Values:
[user@]host – Hostname and address to SSH to
- Options:
- cipher <id>
Selects the cipher specification for encrypting the session.
- Values:
id – Chose cipher.
- vrf <id>
Set source address to a specific VRF
- Reference:
- Values:
id – VRF name
- port <u32>
Specify a port number to connect
- Values:
u32 – Port to connect
- verbose
Verbose mode.
- force-ipv6
Forces ssh to use IPv6 addresses only
- force-version-1
Forces ssh to try protocol version 1 only
- escapechar <txt>
Sets the escape character.
- Values:
txt – Escape character.
- force-version-2
Forces ssh to try protocol version 2 only
- force-ipv4
Forces ssh to use IPv4 addresses only
- key-exchange <id>
Specifies the available KEX (Key Exchange) algorithms
- Values:
id – Specifies the available KEX (Key Exchange) algorithms
- force
Force connection. Remove the key if exists in known_hosts file
- local-address <value>
Use local IP address as the source address of the connection.
- Values:
value – Local IP address
- private-key <file>
Private key to use when logging in remotely
- Values:
file – Private key to use when logging in remotely
- quiet
Supress most of warning and diagnostic messages.
- option <value>
Additional SSH options
- Values:
value – Optional argument
- syslog
Send log information using the syslog system module.
- mac <id>
Specifies the MAC (Message Authentication Code) algorithm to use
- Values:
id –
Specifies the MAC (Message Authentication Code) algorithm to use
The MAC algorithm is used for data integrity protection. The algorithms that contain “-etm” calculate the MAC after encryption (encrypt-then-mac). These are considered safer and their use recommended. Notice that some cipher algorithms already offer authentication (the ones that are named like “…@openssh.com”). Those algorithms will make the SSH clients to ignore the MAC setting.