Terminating The Connection With The Sftp Server; Configuring The Device As An Scp Client; Establishing A Connection To An Scp Server - HPE Moonshot 45Gc Security Configuration Manual

Switch module
Table of Contents

Advertisement

Terminating the connection with the SFTP server

Task
Terminate the connection with the
SFTP server and return to user
view.

Configuring the device as an SCP client

This section describes how to configure the device as an SCP client to establish a connection with an
SCP server and transfer files with the server.

Establishing a connection to an SCP server

When you try to access an SCP server, the device must use the server's host public key to
authenticate the server. If the server's host public key is not configured on the device, the device will
notify you to confirm whether to continue with the access.
If you choose to continue, the device accesses the server and downloads the server's host
public key.
If you choose to not continue, the connection cannot be established.
As a best practice, configure the server's host public key on the device in an insecure network.
To transfer files with an SCP server:
Task
Connect to the SCP
server, and transfer files
with the server.
Command
bye
exit
quit
Command
In non-FIPS mode, connect to the IPv4 SCP
server, and transfer files with this server:
scp server [ port-number ] [ vpn-instance
vpn-instance-name ] { put | get } source-file-name
[ destination-file-name ] [ identity-key { dsa |
ecdsa | rsa | { x509v3-ecdsa-sha2-nistp384 |
x509v3-ecdsa-sha2-nistp256 } pki-domain
domain-name } | prefer-compress zlib |
prefer-ctos-cipher { 3des-cbc | aes128-cbc |
aes256-cbc | des-cbc | aes128-ctr | aes192-ctr |
aes256-ctr | aes128-gcm | aes256-gcm } |
prefer-ctos-hmac { md5 | md5-96 | sha1 |
sha1-96 | sha2-256 | sha2-512 } | prefer-kex
{ dh-group-exchange-sha1 | dh-group1-sha1 |
dh-group14-sha1 | ecdh-sha2-nistp256 |
ecdh-sha2-nistp384 } | prefer-stoc-cipher
{ 3des-cbc | aes128-cbc | aes256-cbc | des-cbc
| aes128-ctr | aes192-ctr | aes256-ctr |
aes128-gcm | aes256-gcm } | prefer-stoc-hmac
{ md5 | md5-96 | sha1 | sha1-96 | sha2-256 |
sha2-512 }] * [ { public-key keyname |
server-pki-domain domain-name } | source
{ interface interface-type interface-number | ip
ip-address } ] *
In FIPS mode, connect to the IPv4 SCP server,
and transfer files with this server:
scp server [ port-number ] [ vpn-instance
vpn-instance-name ] { put | get } source-file-name
[ destination-file-name ] [ identity-key { ecdsa |
342
Remarks
Available in SFTP client view.
These three commands have the
same function.
Remarks
Available in user view.

Advertisement

Table of Contents
loading

Table of Contents