Protection Methods - Cisco 500 series Administration Manual

Stackable managed switch
Hide thumbs Also See for 500 series:
Table of Contents

Advertisement

Using the SSH Client Feature

Protection Methods

Protection Methods
Cisco 500 Series Stackable Managed Switch Administration Guide
When files are downloaded via TFTP or HTTP, the data transfer is unsecured.
When files are downloaded via SCP, the information is downloaded from the SCP
server to the switch via a secure channel. The creation of this secure channel is
preceded by authentication, which ensures that the user is permitted to perform
the operation.
Authentication information must be entered by the user, both on the switch and on
the SSH server, although this guide does not describe server operations.
The following displays a typical network configuration in which the SCP feature
might be used.
Typical Network Configuration
When data is transferred from an SSH server to a switch (client), the SSH server
uses various methods for client authentication. These are described below.
Passwords
To use the password method, first ensure that a username/password has been
established on the SSH server. This is not done through the switch's management
system, although, after a username has been established on the server, the server
password can be changed through the switch's management system.
The username/password must then be created on the switch. When data is
transferred from the server to the switch, the username/password supplied by the
switch must match the username/password on the server.
19
348

Advertisement

Table of Contents
loading

Table of Contents