Step
2.
Download a
file from an
SCP server.
IMPORTANT:
File transfer interruption during a downloading process can result in file fragments on the switch. You must
manually delete them.
SCP client configuration example
Unless otherwise noted, devices in the configuration example are operating in non-FIPS mode.
Network requirements
As shown in
user has the username test and uses the password authentication method.
Figure 104 Network diagram
Command
•
Download a file from the remote IPv4 SCP server:
In non-FIPS mode:
scp server [ port-number ] get source-file-path
[ destination-file-path ] [ identity-key { dsa | rsa } |
prefer-ctos-cipher { 3des | aes128 | des } | prefer-ctos-hmac
{ md5 | md5-96 | sha1 | sha1-96 } | prefer-kex
{ dh-group-exchange | dh-group1 | dh-group14 } |
prefer-stoc-cipher { 3des | aes128 | des } | prefer-stoc-hmac
{ md5 | md5-96 | sha1 | sha1-96 } ] *
In FIPS mode:
scp server [ port-number ] get source-file-path
[ destination-file-path ] [ identity-key rsa | prefer-ctos-cipher
{ aes128 | aes256 } | prefer-ctos-hmac { sha1 | sha1-96 } |
prefer-kex dh-group14 | prefer-stoc-cipher { aes128 | aes256 } |
prefer-stoc-hmac { sha1 | sha1-96 } ] *
•
Download a file from the remote IPv6 SCP server:
In non-FIPS mode:
scp ipv6 server [ port-number ] get source-file-path
[ destination-file-path ] [ identity-key { dsa | rsa } |
prefer-ctos-cipher { 3des | aes128 | des } | prefer-ctos-hmac
{ md5 | md5-96 | sha1 | sha1-96 } | prefer-kex
{ dh-group-exchange | dh-group1 | dh-group14 } |
prefer-stoc-cipher { 3des | aes128 | des } | prefer-stoc-hmac
{ md5 | md5-96 | sha1 | sha1-96 } ] *
In FIPS mode:
scp ipv6 server [ port-number ] get source-file-path
[ destination-file-path ] [ identity-key rsa | prefer-ctos-cipher
{ aes128 | aes256 } | prefer-ctos-hmac { sha1 | sha1-96 } |
prefer-kex dh-group14 | prefer-stoc-cipher { aes128 | aes256 } |
prefer-stoc-hmac { sha1 | sha1-96 } ] *
Figure
104, switch A acts as a client and download the file remote.bin from switch B. The
440
Remarks