Cisco Systems SG30052PK9NA Manual De Usuario

Descargar
Página de 483
Security: SSH Client
Protection Methods
381
Cisco Small Business 300 Series Managed Switch Administration Guide 
19
When files are downloaded via TFTP or HTTP, the data transfer is unsecured. 
When files are downloaded via SCP, the information is downloaded from the SCP 
server to the device via a secure channel. The creation of this secure channel is 
preceded by authentication, which ensures that the user is permitted to perform 
the operation. 
Authentication information must be entered by the user, both on the device and on 
the SSH server, although this guide does not describe server operations.
The following illustrates a typical network configuration in which the SCP feature 
might be used. 
Typical Network Configuration
Protection Methods
When data is transferred from an SSH server to a device (client), the SSH server 
uses various methods for client authentication. These are described below.
Passwords
To use the password method, first ensure that a username/password has been 
established on the SSH server. This is not done through the device’s management 
system, although, after a username has been established on the server, the server 
password can be changed through the device’s management system.