Protection Methods; Passwords - Cisco Small Business 200 Administration Manual

Table of Contents

Advertisement

18

Protection Methods

277
When files are downloaded via TFTP or HTTP, the data transfer is unsecured.
When files are downloaded via SCP, the information is downloaded from the SCP
server to the device via a secure channel. The creation of this secure channel is
preceded by authentication, which ensures that the user is permitted to perform
the operation.
Authentication information must be entered by the user, both on the device and on
the SSH server, although this guide does not describe server operations.
The following illustrates a typical network configuration in which the SCP feature
might be used.
Typical Network Configuration
When data is transferred from an SSH server to a device (client), the SSH server
uses various methods for client authentication. These are described below.

Passwords

To use the password method, first ensure that a username/password has been
established on the SSH server. This is not done through the device's management
system, although, after a username has been established on the server, the server
password can be changed through the device's management system.
Cisco Small Business 200 Series Smart Switch Administration Guide
Security: SSH Client
Protection Methods

Advertisement

Table of Contents
loading

Table of Contents