APC AP9290 Manuel D’Utilisation

Page de 113
®
USER’S GUIDE
Vertical Console Port Server
90
Secure SHell (SSH) and Secure CoPy (SCP)
The Secure SHell (SSH) protocol provides a secure mechanism to access 
computer consoles or shells remotely. The protocol authenticates the server 
(in this case, the VCPS) and encrypts all transmissions between the SSH 
client and the server.
• SSH is an alternative to Telnet, which does not provide encryption.
• SSH protects the username and password, the credentials for 
authentication, from anyone intercepting network traffic.
• To authenticate the SSH server (the VCPS) to the SSH client, SSH 
uses a host key that is unique to the SSH server and that provides an 
identification that cannot be falsified. Therefore, an invalid server on 
the network cannot obtain a user name and password from a user by 
presenting itself as a valid server.
• The VCPS supports versions 1 and 2 of SSH.
• If you enable SSH, you should disable Telnet for a higher level of 
security for your system.
• The interface, user accounts, and user access rights are the same 
whether you access the control console through SSH or Telnet.
Secure CoPy (SCP) is a secure file transfer application that you can use 
instead of FTP. SCP uses the SSH protocol as the underlying transport 
protocol for encryption of user names, passwords, and files.
• When you enable and configure SSH, you automatically enable and 
configure SCP. No further configuration of SCP is needed.
• If you enabled SSH and SCP, you should disable FTP for a higher level 
of security for your system.
For information on supported SSH client applications, see