Cisco Systems 3560 Manual De Usuario

Descargar
Página de 1288
 
9-49
Catalyst 3560 Switch Software Configuration Guide
OL-8553-06
Chapter 9      Configuring Switch-Based Authentication
Configuring the Switch for Secure Copy Protocol
Because SSH also relies on AAA authentication, and SCP relies further on AAA authorization, correct 
configuration is necessary. 
  •
Before enabling SCP, you must correctly configure SSH, authentication, and authorization on the 
switch.
  •
Because SCP relies on SSH for its secure transport, the router must have an Rivest, Shamir, and 
Adelman (RSA) key pair.
Note
When using SCP, you cannot enter the password into the copy command. You must enter the password 
when prompted.
Information About Secure Copy 
To configure the Secure Copy feature, you should understand these concepts.
 The behavior of SCP is similar to that of remote copy (rcp), which comes from the Berkeley r-tools 
suite, except that SCP relies on SSH for security. SCP also requires that authentication, authorization, 
and accounting (AAA) authorization be configured so the router can determine whether the user has the 
correct privilege level.
A user who has appropriate authorization can use SCP to copy any file in the Cisco IOS File System 
(IFS) to and from a switch by using the copy command. An authorized administrator can also do this 
from a workstation.
For more information on how to configure and verify SCP, see the “Secure Copy Protocol” chapter of 
the Cisco IOS New Features, Cisco IOS Release 12.2, at this URL: