hit counter script

Secure Copy Protocol Overview; Secure Copy Protocol - Cisco Catalyst 2960-X Security Configuration Manual

Cisco ios release 15.0(2)ex
Hide thumbs Also See for Catalyst 2960-X:
Table of Contents

Advertisement

Secure Copy Protocol Overview

• If you get CLI error messages after entering the crypto key generate rsa global configuration command,
• When generating the RSA key pair, the message No host name specified might appear. If it does, you
• When generating the RSA key pair, the message No domain specified might appear. If it does, you must
• When configuring the local authentication and authorization authentication method, make sure that AAA
Related Topics
Setting Up the Switch to Run SSH, on page 117
Configuring the Switch for Local Authentication and Authorization, on page 107
Secure Copy Protocol Overview
The Secure Copy Protocol (SCP) feature provides a secure and authenticated method for copying switch
configurations or switch image files. SCP relies on Secure Shell (SSH), an application and a protocol that
provides a secure replacement for the Berkeley r-tools.
For SSH to work, the switch needs an RSA public/private key pair. This is the same with SCP, which relies
on SSH for its secure transport.
Because SSH also relies on AAA authentication, and SCP relies further on AAA authorization, correct
configuration is necessary.
• Before enabling SCP, you must correctly configure SSH, authentication, and authorization on the switch.
• Because SCP relies on SSH for its secure transport, the router must have an Rivest, Shamir, and Adelman
When using SCP, you cannot enter the password into the copy command. You must enter the password
Note
when prompted.

Secure Copy Protocol

The Secure Copy Protocol (SCP) feature provides a secure and authenticated method for copying switch
configurations or switch image files. The behavior of SCP is similar to that of remote copy (rcp), which comes
from the Berkeley r-tools suite, except that SCP relies on SSH for security. SCP also requires that authentication,
authorization, and accounting (AAA) authorization be configured so the switch can determine whether the
user has the correct privilege level. To configure the Secure Copy feature, you should understand the SCP
concepts.
Related Topics
Prerequisites for Configuring Secure Shell, on page 113
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
116
an RSA key pair has not been generated. Reconfigure the hostname and domain, and then enter the
crypto key generate rsa command. For more information, see Related Topics below.
must configure a hostname by using the hostname global configuration command.
configure an IP domain name by using the ip domain-name global configuration command.
is disabled on the console.
(RSA) key pair.
Configuring Secure Shell (SSH)
OL-29048-01

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents