ssh

ssh <value>
SDE M10-Smart M2 RS420 AresC640

Hostname and address to SSH to

Values:
  • [user@]host – Hostname and address to SSH to

Options:

cipher <value>

Selects the cipher specification for encrypting the session.

Values:
  • value – Chose cipher.

vrf <id>

Set source address to a specific VRF

Reference:

system vrf <id>

Values:
  • id – VRF name

port <u32>

Specify a port number to connect

Values:
  • u32 – Port to connect

verbose

Verbose mode.

force-ipv6

Forces ssh to use IPv6 addresses only

force-version-1

Forces ssh to try protocol version 1 only

escapechar <txt>

Sets the escape character.

Values:
  • txt – Escape character.

force-version-2

Forces ssh to try protocol version 2 only

force-ipv4

Forces ssh to use IPv4 addresses only

key-exchange <id>

Specifies the available KEX (Key Exchange) algorithms

Values:
  • id – Specifies the available KEX (Key Exchange) algorithms

force

Force connection. Remove the key if exists in known_hosts file

local-address <value>

Use local IP address as the source address of the connection.

Values:
  • value – Local IP address

private-key <file>

Private key to use when logging in remotely

Values:
  • file – Private key to use when logging in remotely

quiet

Supress most of warning and diagnostic messages.

option <value>

Additional SSH options

Values:
  • value – Optional argument

syslog

Send log information using the syslog system module.

mac <id>

Specifies the MAC (Message Authentication Code) algorithm to use

Values:
  • id – Specifies the MAC (Message Authentication Code) algorithm to use The MAC algorithm is used for data integrity protection. The algorithms that contain “-etm” calculate the MAC after encryption (encrypt-then-mac). These are considered safer and their use recommended. Notice that some cipher algorithms already offer authentication (the ones that are named like “…@openssh.com”). Those algorithms will make the SSH clients to ignore the MAC setting.