ssh
- ssh <value>
 - AresC640
Atlas840
M10-Smart
M2
RS420
RXL15000
SDE
Hostname and address to SSH to
- Values:
 [user@]host – Hostname and address to SSH to
- Options:
 
- host-key-algorithms <id>
 Specifies the host key signature algorithms that the client wants to use in order of preference
- Values:
 id – Choose an algorithm
- cipher <id>
 Selects the cipher specification for encrypting the session.
- Values:
 id – Chose cipher.
- vrf <id>
 Set source address to a specific VRF
- Reference:
 - Values:
 id – VRF name
- port <u32>
 Specify a port number to connect
- Values:
 u32 – Port to connect
- verbose
 Verbose mode.
- force-ipv6
 Forces ssh to use IPv6 addresses only
- force-version-1
 Forces ssh to try protocol version 1 only
- escapechar <txt>
 Sets the escape character.
- Values:
 txt – Escape character.
- force-version-2
 Forces ssh to try protocol version 2 only
- force-ipv4
 Forces ssh to use IPv4 addresses only
- key-exchange <id>
 Specifies the available KEX (Key Exchange) algorithms
- Values:
 id – Specifies the available KEX (Key Exchange) algorithms
- force
 Force connection. Remove the key if exists in known_hosts file
- local-address <value>
 Use local IP address as the source address of the connection.
- Values:
 value – Local IP address
- private-key <file>
 Private key to use when logging in remotely
- Values:
 file – Private key to use when logging in remotely
- quiet
 Supress most of warning and diagnostic messages.
- option <value>
 Additional SSH options
- Values:
 value – Optional argument
- syslog
 Send log information using the syslog system module.
- mac <id>
 Specifies the MAC (Message Authentication Code) algorithm to use
- Values:
 id –
Specifies the MAC (Message Authentication Code) algorithm to use
The MAC algorithm is used for data integrity protection. The algorithms that contain “-etm” calculate the MAC after encryption (encrypt-then-mac). These are considered safer and their use recommended. Notice that some cipher algorithms already offer authentication (the ones that are named like “…@openssh.com”). Those algorithms will make the SSH clients to ignore the MAC setting.