APC AP9290 Manuel D’Utilisation
®
USER’S GUIDE
Vertical Console Port Server
90
Secure SHell (SSH) and Secure CoPy (SCP)
The Secure SHell (SSH) protocol provides a secure mechanism to access
computer consoles or shells remotely. The protocol authenticates the server
(in this case, the VCPS) and encrypts all transmissions between the SSH
client and the server.
computer consoles or shells remotely. The protocol authenticates the server
(in this case, the VCPS) and encrypts all transmissions between the SSH
client and the server.
• SSH is an alternative to Telnet, which does not provide encryption.
• SSH protects the username and password, the credentials for
authentication, from anyone intercepting network traffic.
• To authenticate the SSH server (the VCPS) to the SSH client, SSH
uses a host key that is unique to the SSH server and that provides an
identification that cannot be falsified. Therefore, an invalid server on
the network cannot obtain a user name and password from a user by
presenting itself as a valid server.
identification that cannot be falsified. Therefore, an invalid server on
the network cannot obtain a user name and password from a user by
presenting itself as a valid server.
• The VCPS supports versions 1 and 2 of SSH.
• If you enable SSH, you should disable Telnet for a higher level of
security for your system.
• The interface, user accounts, and user access rights are the same
whether you access the control console through SSH or Telnet.
Secure CoPy (SCP) is a secure file transfer application that you can use
instead of FTP. SCP uses the SSH protocol as the underlying transport
protocol for encryption of user names, passwords, and files.
instead of FTP. SCP uses the SSH protocol as the underlying transport
protocol for encryption of user names, passwords, and files.
• When you enable and configure SSH, you automatically enable and
configure SCP. No further configuration of SCP is needed.
• If you enabled SSH and SCP, you should disable FTP for a higher level
of security for your system.
For information on supported SSH client applications, see