-rwxrwxrwx
-rwxrwxrwx
sftp> delete z
Removing /z
sftp> dir -l
-rwxrwxrwx
-rwxrwxrwx
-rwxrwxrwx
# Add a directory named new1 and verify the result.
sftp> mkdir new1
sftp> dir -l
-rwxrwxrwx
-rwxrwxrwx
-rwxrwxrwx
drwxrwxrwx
# Rename the directory new1 to new2 and verify the result.
sftp> rename new1 new2
sftp> dir
-rwxrwxrwx
-rwxrwxrwx
-rwxrwxrwx
drwxrwxrwx
# Download the pubkey2 file from the server and save it as a local file public.
sftp> get pubkey2 public
Fetching / pubkey2 to public
/pubkey2
# Upload a local file pu to the server, save it as puk, and verify the result.
sftp> put pu puk
Uploading pu to / puk
sftp> dir
-rwxrwxrwx
-rwxrwxrwx
-rwxrwxrwx
-rwxrwxrwx
sftp>
# Exit SFTP client view.
sftp> quit
<RouterA>
SCP file transfer with password authentication
Unless otherwise noted, devices in the configuration examples are in non-FIPS mode.
If you configure an SCP server in FIPS mode, follow these guidelines:
The modulus length of the key pair must be 2048 bits.
•
Do not generate a DSA key pair on the SCP server. Only RSA key pairs are supported.
•
1 1
1
1 1
1
1 1
1
1 1
1
1 1
1
1 1
1
1 1
1
1 1
1
1 1
1
1 1
1
1 1
1
1 1
1
1 1
1
1 1
1
1 1
1
1 1
1
1 1
1
301 Dec 18 14:12 012.pub
301 Dec 18 14:12 013 z
301 Dec 18 14:11 010.pub
301 Dec 18 14:12 011.pub
301 Dec 18 14:12 012.pub
301 Dec 18 14:11 010.pub
301 Dec 18 14:12 011.pub
301 Dec 18 14:12 012.pub
301 Dec 18 14:12 013 new1
301 Dec 18 14:11 010.pub
301 Dec 18 14:12 011.pub
301 Dec 18 14:12 012.pub
301 Dec 18 14:12 013 new2
100% 225
301 Dec 18 14:11 010.pub
301 Dec 18 14:12 011.pub
301 Dec 18 14:12 012.pub
301 Dec 18 14:12 013 puk
279
1.4KB/s
00:00